pulumi-gcp 8.3.0a1726834947__py3-none-any.whl → 8.3.0a1727226164__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. pulumi_gcp/__init__.py +120 -0
  2. pulumi_gcp/alloydb/_inputs.py +20 -0
  3. pulumi_gcp/alloydb/instance.py +36 -0
  4. pulumi_gcp/alloydb/outputs.py +14 -0
  5. pulumi_gcp/compute/__init__.py +1 -0
  6. pulumi_gcp/compute/_inputs.py +1400 -0
  7. pulumi_gcp/compute/attached_disk.py +103 -0
  8. pulumi_gcp/compute/backend_service.py +29 -22
  9. pulumi_gcp/compute/firewall_policy_with_rules.py +769 -0
  10. pulumi_gcp/compute/outputs.py +1019 -0
  11. pulumi_gcp/compute/region_backend_service.py +29 -22
  12. pulumi_gcp/compute/router_nat.py +27 -66
  13. pulumi_gcp/config/__init__.pyi +2 -0
  14. pulumi_gcp/config/vars.py +4 -0
  15. pulumi_gcp/container/_inputs.py +72 -99
  16. pulumi_gcp/container/outputs.py +53 -70
  17. pulumi_gcp/databasemigrationservice/__init__.py +1 -0
  18. pulumi_gcp/databasemigrationservice/_inputs.py +362 -0
  19. pulumi_gcp/databasemigrationservice/migration_job.py +1739 -0
  20. pulumi_gcp/databasemigrationservice/outputs.py +268 -0
  21. pulumi_gcp/dataproc/get_metastore_service.py +11 -1
  22. pulumi_gcp/dataproc/metastore_service.py +93 -0
  23. pulumi_gcp/developerconnect/_inputs.py +42 -39
  24. pulumi_gcp/developerconnect/connection.py +86 -83
  25. pulumi_gcp/developerconnect/outputs.py +28 -26
  26. pulumi_gcp/discoveryengine/__init__.py +1 -0
  27. pulumi_gcp/discoveryengine/_inputs.py +131 -0
  28. pulumi_gcp/discoveryengine/outputs.py +131 -0
  29. pulumi_gcp/discoveryengine/target_site.py +870 -0
  30. pulumi_gcp/dns/managed_zone.py +1 -1
  31. pulumi_gcp/filestore/get_instance.py +21 -1
  32. pulumi_gcp/filestore/instance.py +94 -0
  33. pulumi_gcp/gkehub/feature_membership.py +140 -62
  34. pulumi_gcp/healthcare/__init__.py +1 -0
  35. pulumi_gcp/healthcare/_inputs.py +39 -0
  36. pulumi_gcp/healthcare/outputs.py +40 -0
  37. pulumi_gcp/healthcare/workspace.py +465 -0
  38. pulumi_gcp/looker/instance.py +81 -0
  39. pulumi_gcp/netapp/_inputs.py +63 -0
  40. pulumi_gcp/netapp/outputs.py +57 -0
  41. pulumi_gcp/netapp/storage_pool.py +54 -0
  42. pulumi_gcp/netapp/volume.py +82 -0
  43. pulumi_gcp/provider.py +20 -0
  44. pulumi_gcp/pubsub/subscription.py +43 -7
  45. pulumi_gcp/pulumi-plugin.json +1 -1
  46. pulumi_gcp/secretmanager/__init__.py +8 -0
  47. pulumi_gcp/secretmanager/_inputs.py +308 -0
  48. pulumi_gcp/secretmanager/get_regional_secret.py +279 -0
  49. pulumi_gcp/secretmanager/get_regional_secret_iam_policy.py +173 -0
  50. pulumi_gcp/secretmanager/get_regional_secret_version.py +241 -0
  51. pulumi_gcp/secretmanager/outputs.py +336 -0
  52. pulumi_gcp/secretmanager/regional_secret.py +1433 -0
  53. pulumi_gcp/secretmanager/regional_secret_iam_binding.py +1082 -0
  54. pulumi_gcp/secretmanager/regional_secret_iam_member.py +1082 -0
  55. pulumi_gcp/secretmanager/regional_secret_iam_policy.py +901 -0
  56. pulumi_gcp/secretmanager/regional_secret_version.py +753 -0
  57. pulumi_gcp/securitycenter/__init__.py +4 -0
  58. pulumi_gcp/securitycenter/folder_scc_big_query_export.py +795 -0
  59. pulumi_gcp/securitycenter/organization_scc_big_query_export.py +738 -0
  60. pulumi_gcp/securitycenter/project_scc_big_query_export.py +749 -0
  61. pulumi_gcp/securitycenter/v2_organization_scc_big_query_export.py +862 -0
  62. pulumi_gcp/securitycenter/v2_organization_scc_big_query_exports.py +6 -2
  63. pulumi_gcp/siteverification/__init__.py +3 -0
  64. pulumi_gcp/siteverification/_inputs.py +85 -0
  65. pulumi_gcp/siteverification/outputs.py +57 -0
  66. pulumi_gcp/siteverification/web_resource.py +398 -0
  67. pulumi_gcp/spanner/__init__.py +1 -0
  68. pulumi_gcp/spanner/_inputs.py +129 -0
  69. pulumi_gcp/spanner/backup_schedule.py +748 -0
  70. pulumi_gcp/spanner/get_instance.py +11 -1
  71. pulumi_gcp/spanner/instance.py +56 -0
  72. pulumi_gcp/spanner/outputs.py +93 -0
  73. {pulumi_gcp-8.3.0a1726834947.dist-info → pulumi_gcp-8.3.0a1727226164.dist-info}/METADATA +1 -1
  74. {pulumi_gcp-8.3.0a1726834947.dist-info → pulumi_gcp-8.3.0a1727226164.dist-info}/RECORD +76 -56
  75. {pulumi_gcp-8.3.0a1726834947.dist-info → pulumi_gcp-8.3.0a1727226164.dist-info}/WHEEL +0 -0
  76. {pulumi_gcp-8.3.0a1726834947.dist-info → pulumi_gcp-8.3.0a1727226164.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,901 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['RegionalSecretIamPolicyArgs', 'RegionalSecretIamPolicy']
18
+
19
+ @pulumi.input_type
20
+ class RegionalSecretIamPolicyArgs:
21
+ def __init__(__self__, *,
22
+ policy_data: pulumi.Input[str],
23
+ secret_id: pulumi.Input[str],
24
+ location: Optional[pulumi.Input[str]] = None,
25
+ project: Optional[pulumi.Input[str]] = None):
26
+ """
27
+ The set of arguments for constructing a RegionalSecretIamPolicy resource.
28
+ :param pulumi.Input[str] policy_data: The policy data generated by
29
+ a `organizations_get_iam_policy` data source.
30
+ :param pulumi.Input[str] location: The location of the regional secret. eg us-central1
31
+ Used to find the parent resource to bind the IAM policy to. If not specified,
32
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
33
+ location is specified, it is taken from the provider configuration.
34
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
35
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
36
+ """
37
+ pulumi.set(__self__, "policy_data", policy_data)
38
+ pulumi.set(__self__, "secret_id", secret_id)
39
+ if location is not None:
40
+ pulumi.set(__self__, "location", location)
41
+ if project is not None:
42
+ pulumi.set(__self__, "project", project)
43
+
44
+ @property
45
+ @pulumi.getter(name="policyData")
46
+ def policy_data(self) -> pulumi.Input[str]:
47
+ """
48
+ The policy data generated by
49
+ a `organizations_get_iam_policy` data source.
50
+ """
51
+ return pulumi.get(self, "policy_data")
52
+
53
+ @policy_data.setter
54
+ def policy_data(self, value: pulumi.Input[str]):
55
+ pulumi.set(self, "policy_data", value)
56
+
57
+ @property
58
+ @pulumi.getter(name="secretId")
59
+ def secret_id(self) -> pulumi.Input[str]:
60
+ return pulumi.get(self, "secret_id")
61
+
62
+ @secret_id.setter
63
+ def secret_id(self, value: pulumi.Input[str]):
64
+ pulumi.set(self, "secret_id", value)
65
+
66
+ @property
67
+ @pulumi.getter
68
+ def location(self) -> Optional[pulumi.Input[str]]:
69
+ """
70
+ The location of the regional secret. eg us-central1
71
+ Used to find the parent resource to bind the IAM policy to. If not specified,
72
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
73
+ location is specified, it is taken from the provider configuration.
74
+ """
75
+ return pulumi.get(self, "location")
76
+
77
+ @location.setter
78
+ def location(self, value: Optional[pulumi.Input[str]]):
79
+ pulumi.set(self, "location", value)
80
+
81
+ @property
82
+ @pulumi.getter
83
+ def project(self) -> Optional[pulumi.Input[str]]:
84
+ """
85
+ The ID of the project in which the resource belongs.
86
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
87
+ """
88
+ return pulumi.get(self, "project")
89
+
90
+ @project.setter
91
+ def project(self, value: Optional[pulumi.Input[str]]):
92
+ pulumi.set(self, "project", value)
93
+
94
+
95
+ @pulumi.input_type
96
+ class _RegionalSecretIamPolicyState:
97
+ def __init__(__self__, *,
98
+ etag: Optional[pulumi.Input[str]] = None,
99
+ location: Optional[pulumi.Input[str]] = None,
100
+ policy_data: Optional[pulumi.Input[str]] = None,
101
+ project: Optional[pulumi.Input[str]] = None,
102
+ secret_id: Optional[pulumi.Input[str]] = None):
103
+ """
104
+ Input properties used for looking up and filtering RegionalSecretIamPolicy resources.
105
+ :param pulumi.Input[str] etag: (Computed) The etag of the IAM policy.
106
+ :param pulumi.Input[str] location: The location of the regional secret. eg us-central1
107
+ Used to find the parent resource to bind the IAM policy to. If not specified,
108
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
109
+ location is specified, it is taken from the provider configuration.
110
+ :param pulumi.Input[str] policy_data: The policy data generated by
111
+ a `organizations_get_iam_policy` data source.
112
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
113
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
114
+ """
115
+ if etag is not None:
116
+ pulumi.set(__self__, "etag", etag)
117
+ if location is not None:
118
+ pulumi.set(__self__, "location", location)
119
+ if policy_data is not None:
120
+ pulumi.set(__self__, "policy_data", policy_data)
121
+ if project is not None:
122
+ pulumi.set(__self__, "project", project)
123
+ if secret_id is not None:
124
+ pulumi.set(__self__, "secret_id", secret_id)
125
+
126
+ @property
127
+ @pulumi.getter
128
+ def etag(self) -> Optional[pulumi.Input[str]]:
129
+ """
130
+ (Computed) The etag of the IAM policy.
131
+ """
132
+ return pulumi.get(self, "etag")
133
+
134
+ @etag.setter
135
+ def etag(self, value: Optional[pulumi.Input[str]]):
136
+ pulumi.set(self, "etag", value)
137
+
138
+ @property
139
+ @pulumi.getter
140
+ def location(self) -> Optional[pulumi.Input[str]]:
141
+ """
142
+ The location of the regional secret. eg us-central1
143
+ Used to find the parent resource to bind the IAM policy to. If not specified,
144
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
145
+ location is specified, it is taken from the provider configuration.
146
+ """
147
+ return pulumi.get(self, "location")
148
+
149
+ @location.setter
150
+ def location(self, value: Optional[pulumi.Input[str]]):
151
+ pulumi.set(self, "location", value)
152
+
153
+ @property
154
+ @pulumi.getter(name="policyData")
155
+ def policy_data(self) -> Optional[pulumi.Input[str]]:
156
+ """
157
+ The policy data generated by
158
+ a `organizations_get_iam_policy` data source.
159
+ """
160
+ return pulumi.get(self, "policy_data")
161
+
162
+ @policy_data.setter
163
+ def policy_data(self, value: Optional[pulumi.Input[str]]):
164
+ pulumi.set(self, "policy_data", value)
165
+
166
+ @property
167
+ @pulumi.getter
168
+ def project(self) -> Optional[pulumi.Input[str]]:
169
+ """
170
+ The ID of the project in which the resource belongs.
171
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
172
+ """
173
+ return pulumi.get(self, "project")
174
+
175
+ @project.setter
176
+ def project(self, value: Optional[pulumi.Input[str]]):
177
+ pulumi.set(self, "project", value)
178
+
179
+ @property
180
+ @pulumi.getter(name="secretId")
181
+ def secret_id(self) -> Optional[pulumi.Input[str]]:
182
+ return pulumi.get(self, "secret_id")
183
+
184
+ @secret_id.setter
185
+ def secret_id(self, value: Optional[pulumi.Input[str]]):
186
+ pulumi.set(self, "secret_id", value)
187
+
188
+
189
+ class RegionalSecretIamPolicy(pulumi.CustomResource):
190
+ @overload
191
+ def __init__(__self__,
192
+ resource_name: str,
193
+ opts: Optional[pulumi.ResourceOptions] = None,
194
+ location: Optional[pulumi.Input[str]] = None,
195
+ policy_data: Optional[pulumi.Input[str]] = None,
196
+ project: Optional[pulumi.Input[str]] = None,
197
+ secret_id: Optional[pulumi.Input[str]] = None,
198
+ __props__=None):
199
+ """
200
+ Three different resources help you manage your IAM policy for Secret Manager RegionalSecret. Each of these resources serves a different use case:
201
+
202
+ * `secretmanager.RegionalSecretIamPolicy`: Authoritative. Sets the IAM policy for the regionalsecret and replaces any existing policy already attached.
203
+ * `secretmanager.RegionalSecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionalsecret are preserved.
204
+ * `secretmanager.RegionalSecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionalsecret are preserved.
205
+
206
+ A data source can be used to retrieve policy data in advent you do not need creation
207
+
208
+ * `secretmanager.RegionalSecretIamPolicy`: Retrieves the IAM policy for the regionalsecret
209
+
210
+ > **Note:** `secretmanager.RegionalSecretIamPolicy` **cannot** be used in conjunction with `secretmanager.RegionalSecretIamBinding` and `secretmanager.RegionalSecretIamMember` or they will fight over what your policy should be.
211
+
212
+ > **Note:** `secretmanager.RegionalSecretIamBinding` resources **can be** used in conjunction with `secretmanager.RegionalSecretIamMember` resources **only if** they do not grant privilege to the same role.
213
+
214
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
215
+
216
+ ## secretmanager.RegionalSecretIamPolicy
217
+
218
+ ```python
219
+ import pulumi
220
+ import pulumi_gcp as gcp
221
+
222
+ admin = gcp.organizations.get_iam_policy(bindings=[{
223
+ "role": "roles/secretmanager.secretAccessor",
224
+ "members": ["user:jane@example.com"],
225
+ }])
226
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
227
+ project=regional_secret_basic["project"],
228
+ location=regional_secret_basic["location"],
229
+ secret_id=regional_secret_basic["secretId"],
230
+ policy_data=admin.policy_data)
231
+ ```
232
+
233
+ With IAM Conditions:
234
+
235
+ ```python
236
+ import pulumi
237
+ import pulumi_gcp as gcp
238
+
239
+ admin = gcp.organizations.get_iam_policy(bindings=[{
240
+ "role": "roles/secretmanager.secretAccessor",
241
+ "members": ["user:jane@example.com"],
242
+ "condition": {
243
+ "title": "expires_after_2019_12_31",
244
+ "description": "Expiring at midnight of 2019-12-31",
245
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
246
+ },
247
+ }])
248
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
249
+ project=regional_secret_basic["project"],
250
+ location=regional_secret_basic["location"],
251
+ secret_id=regional_secret_basic["secretId"],
252
+ policy_data=admin.policy_data)
253
+ ```
254
+ ## secretmanager.RegionalSecretIamBinding
255
+
256
+ ```python
257
+ import pulumi
258
+ import pulumi_gcp as gcp
259
+
260
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
261
+ project=regional_secret_basic["project"],
262
+ location=regional_secret_basic["location"],
263
+ secret_id=regional_secret_basic["secretId"],
264
+ role="roles/secretmanager.secretAccessor",
265
+ members=["user:jane@example.com"])
266
+ ```
267
+
268
+ With IAM Conditions:
269
+
270
+ ```python
271
+ import pulumi
272
+ import pulumi_gcp as gcp
273
+
274
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
275
+ project=regional_secret_basic["project"],
276
+ location=regional_secret_basic["location"],
277
+ secret_id=regional_secret_basic["secretId"],
278
+ role="roles/secretmanager.secretAccessor",
279
+ members=["user:jane@example.com"],
280
+ condition={
281
+ "title": "expires_after_2019_12_31",
282
+ "description": "Expiring at midnight of 2019-12-31",
283
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
284
+ })
285
+ ```
286
+ ## secretmanager.RegionalSecretIamMember
287
+
288
+ ```python
289
+ import pulumi
290
+ import pulumi_gcp as gcp
291
+
292
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
293
+ project=regional_secret_basic["project"],
294
+ location=regional_secret_basic["location"],
295
+ secret_id=regional_secret_basic["secretId"],
296
+ role="roles/secretmanager.secretAccessor",
297
+ member="user:jane@example.com")
298
+ ```
299
+
300
+ With IAM Conditions:
301
+
302
+ ```python
303
+ import pulumi
304
+ import pulumi_gcp as gcp
305
+
306
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
307
+ project=regional_secret_basic["project"],
308
+ location=regional_secret_basic["location"],
309
+ secret_id=regional_secret_basic["secretId"],
310
+ role="roles/secretmanager.secretAccessor",
311
+ member="user:jane@example.com",
312
+ condition={
313
+ "title": "expires_after_2019_12_31",
314
+ "description": "Expiring at midnight of 2019-12-31",
315
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
316
+ })
317
+ ```
318
+
319
+ ## This resource supports User Project Overrides.
320
+
321
+ -
322
+
323
+ # IAM policy for Secret Manager RegionalSecret
324
+ Three different resources help you manage your IAM policy for Secret Manager RegionalSecret. Each of these resources serves a different use case:
325
+
326
+ * `secretmanager.RegionalSecretIamPolicy`: Authoritative. Sets the IAM policy for the regionalsecret and replaces any existing policy already attached.
327
+ * `secretmanager.RegionalSecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionalsecret are preserved.
328
+ * `secretmanager.RegionalSecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionalsecret are preserved.
329
+
330
+ A data source can be used to retrieve policy data in advent you do not need creation
331
+
332
+ * `secretmanager.RegionalSecretIamPolicy`: Retrieves the IAM policy for the regionalsecret
333
+
334
+ > **Note:** `secretmanager.RegionalSecretIamPolicy` **cannot** be used in conjunction with `secretmanager.RegionalSecretIamBinding` and `secretmanager.RegionalSecretIamMember` or they will fight over what your policy should be.
335
+
336
+ > **Note:** `secretmanager.RegionalSecretIamBinding` resources **can be** used in conjunction with `secretmanager.RegionalSecretIamMember` resources **only if** they do not grant privilege to the same role.
337
+
338
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
339
+
340
+ ## secretmanager.RegionalSecretIamPolicy
341
+
342
+ ```python
343
+ import pulumi
344
+ import pulumi_gcp as gcp
345
+
346
+ admin = gcp.organizations.get_iam_policy(bindings=[{
347
+ "role": "roles/secretmanager.secretAccessor",
348
+ "members": ["user:jane@example.com"],
349
+ }])
350
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
351
+ project=regional_secret_basic["project"],
352
+ location=regional_secret_basic["location"],
353
+ secret_id=regional_secret_basic["secretId"],
354
+ policy_data=admin.policy_data)
355
+ ```
356
+
357
+ With IAM Conditions:
358
+
359
+ ```python
360
+ import pulumi
361
+ import pulumi_gcp as gcp
362
+
363
+ admin = gcp.organizations.get_iam_policy(bindings=[{
364
+ "role": "roles/secretmanager.secretAccessor",
365
+ "members": ["user:jane@example.com"],
366
+ "condition": {
367
+ "title": "expires_after_2019_12_31",
368
+ "description": "Expiring at midnight of 2019-12-31",
369
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
370
+ },
371
+ }])
372
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
373
+ project=regional_secret_basic["project"],
374
+ location=regional_secret_basic["location"],
375
+ secret_id=regional_secret_basic["secretId"],
376
+ policy_data=admin.policy_data)
377
+ ```
378
+ ## secretmanager.RegionalSecretIamBinding
379
+
380
+ ```python
381
+ import pulumi
382
+ import pulumi_gcp as gcp
383
+
384
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
385
+ project=regional_secret_basic["project"],
386
+ location=regional_secret_basic["location"],
387
+ secret_id=regional_secret_basic["secretId"],
388
+ role="roles/secretmanager.secretAccessor",
389
+ members=["user:jane@example.com"])
390
+ ```
391
+
392
+ With IAM Conditions:
393
+
394
+ ```python
395
+ import pulumi
396
+ import pulumi_gcp as gcp
397
+
398
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
399
+ project=regional_secret_basic["project"],
400
+ location=regional_secret_basic["location"],
401
+ secret_id=regional_secret_basic["secretId"],
402
+ role="roles/secretmanager.secretAccessor",
403
+ members=["user:jane@example.com"],
404
+ condition={
405
+ "title": "expires_after_2019_12_31",
406
+ "description": "Expiring at midnight of 2019-12-31",
407
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
408
+ })
409
+ ```
410
+ ## secretmanager.RegionalSecretIamMember
411
+
412
+ ```python
413
+ import pulumi
414
+ import pulumi_gcp as gcp
415
+
416
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
417
+ project=regional_secret_basic["project"],
418
+ location=regional_secret_basic["location"],
419
+ secret_id=regional_secret_basic["secretId"],
420
+ role="roles/secretmanager.secretAccessor",
421
+ member="user:jane@example.com")
422
+ ```
423
+
424
+ With IAM Conditions:
425
+
426
+ ```python
427
+ import pulumi
428
+ import pulumi_gcp as gcp
429
+
430
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
431
+ project=regional_secret_basic["project"],
432
+ location=regional_secret_basic["location"],
433
+ secret_id=regional_secret_basic["secretId"],
434
+ role="roles/secretmanager.secretAccessor",
435
+ member="user:jane@example.com",
436
+ condition={
437
+ "title": "expires_after_2019_12_31",
438
+ "description": "Expiring at midnight of 2019-12-31",
439
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
440
+ })
441
+ ```
442
+
443
+ ## Import
444
+
445
+ For all import syntaxes, the "resource in question" can take any of the following forms:
446
+
447
+ * projects/{{project}}/locations/{{location}}/secrets/{{secret_id}}
448
+
449
+ * {{project}}/{{location}}/{{secret_id}}
450
+
451
+ * {{location}}/{{secret_id}}
452
+
453
+ * {{secret_id}}
454
+
455
+ Any variables not passed in the import command will be taken from the provider configuration.
456
+
457
+ Secret Manager regionalsecret IAM resources can be imported using the resource identifiers, role, and member.
458
+
459
+ IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
460
+
461
+ ```sh
462
+ $ pulumi import gcp:secretmanager/regionalSecretIamPolicy:RegionalSecretIamPolicy editor "projects/{{project}}/locations/{{location}}/secrets/{{secret_id}} roles/secretmanager.secretAccessor user:jane@example.com"
463
+ ```
464
+
465
+ IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
466
+
467
+ ```sh
468
+ $ pulumi import gcp:secretmanager/regionalSecretIamPolicy:RegionalSecretIamPolicy editor "projects/{{project}}/locations/{{location}}/secrets/{{secret_id}} roles/secretmanager.secretAccessor"
469
+ ```
470
+
471
+ IAM policy imports use the identifier of the resource in question, e.g.
472
+
473
+ ```sh
474
+ $ pulumi import gcp:secretmanager/regionalSecretIamPolicy:RegionalSecretIamPolicy editor projects/{{project}}/locations/{{location}}/secrets/{{secret_id}}
475
+ ```
476
+
477
+ -> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
478
+
479
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
480
+
481
+ :param str resource_name: The name of the resource.
482
+ :param pulumi.ResourceOptions opts: Options for the resource.
483
+ :param pulumi.Input[str] location: The location of the regional secret. eg us-central1
484
+ Used to find the parent resource to bind the IAM policy to. If not specified,
485
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
486
+ location is specified, it is taken from the provider configuration.
487
+ :param pulumi.Input[str] policy_data: The policy data generated by
488
+ a `organizations_get_iam_policy` data source.
489
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
490
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
491
+ """
492
+ ...
493
+ @overload
494
+ def __init__(__self__,
495
+ resource_name: str,
496
+ args: RegionalSecretIamPolicyArgs,
497
+ opts: Optional[pulumi.ResourceOptions] = None):
498
+ """
499
+ Three different resources help you manage your IAM policy for Secret Manager RegionalSecret. Each of these resources serves a different use case:
500
+
501
+ * `secretmanager.RegionalSecretIamPolicy`: Authoritative. Sets the IAM policy for the regionalsecret and replaces any existing policy already attached.
502
+ * `secretmanager.RegionalSecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionalsecret are preserved.
503
+ * `secretmanager.RegionalSecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionalsecret are preserved.
504
+
505
+ A data source can be used to retrieve policy data in advent you do not need creation
506
+
507
+ * `secretmanager.RegionalSecretIamPolicy`: Retrieves the IAM policy for the regionalsecret
508
+
509
+ > **Note:** `secretmanager.RegionalSecretIamPolicy` **cannot** be used in conjunction with `secretmanager.RegionalSecretIamBinding` and `secretmanager.RegionalSecretIamMember` or they will fight over what your policy should be.
510
+
511
+ > **Note:** `secretmanager.RegionalSecretIamBinding` resources **can be** used in conjunction with `secretmanager.RegionalSecretIamMember` resources **only if** they do not grant privilege to the same role.
512
+
513
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
514
+
515
+ ## secretmanager.RegionalSecretIamPolicy
516
+
517
+ ```python
518
+ import pulumi
519
+ import pulumi_gcp as gcp
520
+
521
+ admin = gcp.organizations.get_iam_policy(bindings=[{
522
+ "role": "roles/secretmanager.secretAccessor",
523
+ "members": ["user:jane@example.com"],
524
+ }])
525
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
526
+ project=regional_secret_basic["project"],
527
+ location=regional_secret_basic["location"],
528
+ secret_id=regional_secret_basic["secretId"],
529
+ policy_data=admin.policy_data)
530
+ ```
531
+
532
+ With IAM Conditions:
533
+
534
+ ```python
535
+ import pulumi
536
+ import pulumi_gcp as gcp
537
+
538
+ admin = gcp.organizations.get_iam_policy(bindings=[{
539
+ "role": "roles/secretmanager.secretAccessor",
540
+ "members": ["user:jane@example.com"],
541
+ "condition": {
542
+ "title": "expires_after_2019_12_31",
543
+ "description": "Expiring at midnight of 2019-12-31",
544
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
545
+ },
546
+ }])
547
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
548
+ project=regional_secret_basic["project"],
549
+ location=regional_secret_basic["location"],
550
+ secret_id=regional_secret_basic["secretId"],
551
+ policy_data=admin.policy_data)
552
+ ```
553
+ ## secretmanager.RegionalSecretIamBinding
554
+
555
+ ```python
556
+ import pulumi
557
+ import pulumi_gcp as gcp
558
+
559
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
560
+ project=regional_secret_basic["project"],
561
+ location=regional_secret_basic["location"],
562
+ secret_id=regional_secret_basic["secretId"],
563
+ role="roles/secretmanager.secretAccessor",
564
+ members=["user:jane@example.com"])
565
+ ```
566
+
567
+ With IAM Conditions:
568
+
569
+ ```python
570
+ import pulumi
571
+ import pulumi_gcp as gcp
572
+
573
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
574
+ project=regional_secret_basic["project"],
575
+ location=regional_secret_basic["location"],
576
+ secret_id=regional_secret_basic["secretId"],
577
+ role="roles/secretmanager.secretAccessor",
578
+ members=["user:jane@example.com"],
579
+ condition={
580
+ "title": "expires_after_2019_12_31",
581
+ "description": "Expiring at midnight of 2019-12-31",
582
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
583
+ })
584
+ ```
585
+ ## secretmanager.RegionalSecretIamMember
586
+
587
+ ```python
588
+ import pulumi
589
+ import pulumi_gcp as gcp
590
+
591
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
592
+ project=regional_secret_basic["project"],
593
+ location=regional_secret_basic["location"],
594
+ secret_id=regional_secret_basic["secretId"],
595
+ role="roles/secretmanager.secretAccessor",
596
+ member="user:jane@example.com")
597
+ ```
598
+
599
+ With IAM Conditions:
600
+
601
+ ```python
602
+ import pulumi
603
+ import pulumi_gcp as gcp
604
+
605
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
606
+ project=regional_secret_basic["project"],
607
+ location=regional_secret_basic["location"],
608
+ secret_id=regional_secret_basic["secretId"],
609
+ role="roles/secretmanager.secretAccessor",
610
+ member="user:jane@example.com",
611
+ condition={
612
+ "title": "expires_after_2019_12_31",
613
+ "description": "Expiring at midnight of 2019-12-31",
614
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
615
+ })
616
+ ```
617
+
618
+ ## This resource supports User Project Overrides.
619
+
620
+ -
621
+
622
+ # IAM policy for Secret Manager RegionalSecret
623
+ Three different resources help you manage your IAM policy for Secret Manager RegionalSecret. Each of these resources serves a different use case:
624
+
625
+ * `secretmanager.RegionalSecretIamPolicy`: Authoritative. Sets the IAM policy for the regionalsecret and replaces any existing policy already attached.
626
+ * `secretmanager.RegionalSecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionalsecret are preserved.
627
+ * `secretmanager.RegionalSecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionalsecret are preserved.
628
+
629
+ A data source can be used to retrieve policy data in advent you do not need creation
630
+
631
+ * `secretmanager.RegionalSecretIamPolicy`: Retrieves the IAM policy for the regionalsecret
632
+
633
+ > **Note:** `secretmanager.RegionalSecretIamPolicy` **cannot** be used in conjunction with `secretmanager.RegionalSecretIamBinding` and `secretmanager.RegionalSecretIamMember` or they will fight over what your policy should be.
634
+
635
+ > **Note:** `secretmanager.RegionalSecretIamBinding` resources **can be** used in conjunction with `secretmanager.RegionalSecretIamMember` resources **only if** they do not grant privilege to the same role.
636
+
637
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
638
+
639
+ ## secretmanager.RegionalSecretIamPolicy
640
+
641
+ ```python
642
+ import pulumi
643
+ import pulumi_gcp as gcp
644
+
645
+ admin = gcp.organizations.get_iam_policy(bindings=[{
646
+ "role": "roles/secretmanager.secretAccessor",
647
+ "members": ["user:jane@example.com"],
648
+ }])
649
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
650
+ project=regional_secret_basic["project"],
651
+ location=regional_secret_basic["location"],
652
+ secret_id=regional_secret_basic["secretId"],
653
+ policy_data=admin.policy_data)
654
+ ```
655
+
656
+ With IAM Conditions:
657
+
658
+ ```python
659
+ import pulumi
660
+ import pulumi_gcp as gcp
661
+
662
+ admin = gcp.organizations.get_iam_policy(bindings=[{
663
+ "role": "roles/secretmanager.secretAccessor",
664
+ "members": ["user:jane@example.com"],
665
+ "condition": {
666
+ "title": "expires_after_2019_12_31",
667
+ "description": "Expiring at midnight of 2019-12-31",
668
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
669
+ },
670
+ }])
671
+ policy = gcp.secretmanager.RegionalSecretIamPolicy("policy",
672
+ project=regional_secret_basic["project"],
673
+ location=regional_secret_basic["location"],
674
+ secret_id=regional_secret_basic["secretId"],
675
+ policy_data=admin.policy_data)
676
+ ```
677
+ ## secretmanager.RegionalSecretIamBinding
678
+
679
+ ```python
680
+ import pulumi
681
+ import pulumi_gcp as gcp
682
+
683
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
684
+ project=regional_secret_basic["project"],
685
+ location=regional_secret_basic["location"],
686
+ secret_id=regional_secret_basic["secretId"],
687
+ role="roles/secretmanager.secretAccessor",
688
+ members=["user:jane@example.com"])
689
+ ```
690
+
691
+ With IAM Conditions:
692
+
693
+ ```python
694
+ import pulumi
695
+ import pulumi_gcp as gcp
696
+
697
+ binding = gcp.secretmanager.RegionalSecretIamBinding("binding",
698
+ project=regional_secret_basic["project"],
699
+ location=regional_secret_basic["location"],
700
+ secret_id=regional_secret_basic["secretId"],
701
+ role="roles/secretmanager.secretAccessor",
702
+ members=["user:jane@example.com"],
703
+ condition={
704
+ "title": "expires_after_2019_12_31",
705
+ "description": "Expiring at midnight of 2019-12-31",
706
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
707
+ })
708
+ ```
709
+ ## secretmanager.RegionalSecretIamMember
710
+
711
+ ```python
712
+ import pulumi
713
+ import pulumi_gcp as gcp
714
+
715
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
716
+ project=regional_secret_basic["project"],
717
+ location=regional_secret_basic["location"],
718
+ secret_id=regional_secret_basic["secretId"],
719
+ role="roles/secretmanager.secretAccessor",
720
+ member="user:jane@example.com")
721
+ ```
722
+
723
+ With IAM Conditions:
724
+
725
+ ```python
726
+ import pulumi
727
+ import pulumi_gcp as gcp
728
+
729
+ member = gcp.secretmanager.RegionalSecretIamMember("member",
730
+ project=regional_secret_basic["project"],
731
+ location=regional_secret_basic["location"],
732
+ secret_id=regional_secret_basic["secretId"],
733
+ role="roles/secretmanager.secretAccessor",
734
+ member="user:jane@example.com",
735
+ condition={
736
+ "title": "expires_after_2019_12_31",
737
+ "description": "Expiring at midnight of 2019-12-31",
738
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
739
+ })
740
+ ```
741
+
742
+ ## Import
743
+
744
+ For all import syntaxes, the "resource in question" can take any of the following forms:
745
+
746
+ * projects/{{project}}/locations/{{location}}/secrets/{{secret_id}}
747
+
748
+ * {{project}}/{{location}}/{{secret_id}}
749
+
750
+ * {{location}}/{{secret_id}}
751
+
752
+ * {{secret_id}}
753
+
754
+ Any variables not passed in the import command will be taken from the provider configuration.
755
+
756
+ Secret Manager regionalsecret IAM resources can be imported using the resource identifiers, role, and member.
757
+
758
+ IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
759
+
760
+ ```sh
761
+ $ pulumi import gcp:secretmanager/regionalSecretIamPolicy:RegionalSecretIamPolicy editor "projects/{{project}}/locations/{{location}}/secrets/{{secret_id}} roles/secretmanager.secretAccessor user:jane@example.com"
762
+ ```
763
+
764
+ IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
765
+
766
+ ```sh
767
+ $ pulumi import gcp:secretmanager/regionalSecretIamPolicy:RegionalSecretIamPolicy editor "projects/{{project}}/locations/{{location}}/secrets/{{secret_id}} roles/secretmanager.secretAccessor"
768
+ ```
769
+
770
+ IAM policy imports use the identifier of the resource in question, e.g.
771
+
772
+ ```sh
773
+ $ pulumi import gcp:secretmanager/regionalSecretIamPolicy:RegionalSecretIamPolicy editor projects/{{project}}/locations/{{location}}/secrets/{{secret_id}}
774
+ ```
775
+
776
+ -> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
777
+
778
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
779
+
780
+ :param str resource_name: The name of the resource.
781
+ :param RegionalSecretIamPolicyArgs args: The arguments to use to populate this resource's properties.
782
+ :param pulumi.ResourceOptions opts: Options for the resource.
783
+ """
784
+ ...
785
+ def __init__(__self__, resource_name: str, *args, **kwargs):
786
+ resource_args, opts = _utilities.get_resource_args_opts(RegionalSecretIamPolicyArgs, pulumi.ResourceOptions, *args, **kwargs)
787
+ if resource_args is not None:
788
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
789
+ else:
790
+ __self__._internal_init(resource_name, *args, **kwargs)
791
+
792
+ def _internal_init(__self__,
793
+ resource_name: str,
794
+ opts: Optional[pulumi.ResourceOptions] = None,
795
+ location: Optional[pulumi.Input[str]] = None,
796
+ policy_data: Optional[pulumi.Input[str]] = None,
797
+ project: Optional[pulumi.Input[str]] = None,
798
+ secret_id: Optional[pulumi.Input[str]] = None,
799
+ __props__=None):
800
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
801
+ if not isinstance(opts, pulumi.ResourceOptions):
802
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
803
+ if opts.id is None:
804
+ if __props__ is not None:
805
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
806
+ __props__ = RegionalSecretIamPolicyArgs.__new__(RegionalSecretIamPolicyArgs)
807
+
808
+ __props__.__dict__["location"] = location
809
+ if policy_data is None and not opts.urn:
810
+ raise TypeError("Missing required property 'policy_data'")
811
+ __props__.__dict__["policy_data"] = policy_data
812
+ __props__.__dict__["project"] = project
813
+ if secret_id is None and not opts.urn:
814
+ raise TypeError("Missing required property 'secret_id'")
815
+ __props__.__dict__["secret_id"] = secret_id
816
+ __props__.__dict__["etag"] = None
817
+ super(RegionalSecretIamPolicy, __self__).__init__(
818
+ 'gcp:secretmanager/regionalSecretIamPolicy:RegionalSecretIamPolicy',
819
+ resource_name,
820
+ __props__,
821
+ opts)
822
+
823
+ @staticmethod
824
+ def get(resource_name: str,
825
+ id: pulumi.Input[str],
826
+ opts: Optional[pulumi.ResourceOptions] = None,
827
+ etag: Optional[pulumi.Input[str]] = None,
828
+ location: Optional[pulumi.Input[str]] = None,
829
+ policy_data: Optional[pulumi.Input[str]] = None,
830
+ project: Optional[pulumi.Input[str]] = None,
831
+ secret_id: Optional[pulumi.Input[str]] = None) -> 'RegionalSecretIamPolicy':
832
+ """
833
+ Get an existing RegionalSecretIamPolicy resource's state with the given name, id, and optional extra
834
+ properties used to qualify the lookup.
835
+
836
+ :param str resource_name: The unique name of the resulting resource.
837
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
838
+ :param pulumi.ResourceOptions opts: Options for the resource.
839
+ :param pulumi.Input[str] etag: (Computed) The etag of the IAM policy.
840
+ :param pulumi.Input[str] location: The location of the regional secret. eg us-central1
841
+ Used to find the parent resource to bind the IAM policy to. If not specified,
842
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
843
+ location is specified, it is taken from the provider configuration.
844
+ :param pulumi.Input[str] policy_data: The policy data generated by
845
+ a `organizations_get_iam_policy` data source.
846
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
847
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
848
+ """
849
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
850
+
851
+ __props__ = _RegionalSecretIamPolicyState.__new__(_RegionalSecretIamPolicyState)
852
+
853
+ __props__.__dict__["etag"] = etag
854
+ __props__.__dict__["location"] = location
855
+ __props__.__dict__["policy_data"] = policy_data
856
+ __props__.__dict__["project"] = project
857
+ __props__.__dict__["secret_id"] = secret_id
858
+ return RegionalSecretIamPolicy(resource_name, opts=opts, __props__=__props__)
859
+
860
+ @property
861
+ @pulumi.getter
862
+ def etag(self) -> pulumi.Output[str]:
863
+ """
864
+ (Computed) The etag of the IAM policy.
865
+ """
866
+ return pulumi.get(self, "etag")
867
+
868
+ @property
869
+ @pulumi.getter
870
+ def location(self) -> pulumi.Output[str]:
871
+ """
872
+ The location of the regional secret. eg us-central1
873
+ Used to find the parent resource to bind the IAM policy to. If not specified,
874
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
875
+ location is specified, it is taken from the provider configuration.
876
+ """
877
+ return pulumi.get(self, "location")
878
+
879
+ @property
880
+ @pulumi.getter(name="policyData")
881
+ def policy_data(self) -> pulumi.Output[str]:
882
+ """
883
+ The policy data generated by
884
+ a `organizations_get_iam_policy` data source.
885
+ """
886
+ return pulumi.get(self, "policy_data")
887
+
888
+ @property
889
+ @pulumi.getter
890
+ def project(self) -> pulumi.Output[str]:
891
+ """
892
+ The ID of the project in which the resource belongs.
893
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
894
+ """
895
+ return pulumi.get(self, "project")
896
+
897
+ @property
898
+ @pulumi.getter(name="secretId")
899
+ def secret_id(self) -> pulumi.Output[str]:
900
+ return pulumi.get(self, "secret_id")
901
+