pulumi-gcp 9.0.0a1__py3-none-any.whl → 9.0.0a1758219982__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (209) hide show
  1. pulumi_gcp/__init__.py +48 -0
  2. pulumi_gcp/activedirectory/peering.py +16 -0
  3. pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
  4. pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
  5. pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
  6. pulumi_gcp/apigateway/api_iam_binding.py +4 -4
  7. pulumi_gcp/apigateway/api_iam_member.py +4 -4
  8. pulumi_gcp/apigateway/api_iam_policy.py +4 -4
  9. pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
  10. pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
  11. pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
  12. pulumi_gcp/artifactregistry/__init__.py +1 -0
  13. pulumi_gcp/artifactregistry/get_python_package.py +237 -0
  14. pulumi_gcp/artifactregistry/get_repository.py +12 -1
  15. pulumi_gcp/artifactregistry/repository.py +28 -0
  16. pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
  17. pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
  18. pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
  19. pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
  20. pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
  21. pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
  22. pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
  23. pulumi_gcp/bigquery/app_profile.py +14 -49
  24. pulumi_gcp/bigquery/dataset_access.py +4 -8
  25. pulumi_gcp/bigquery/table.py +7 -21
  26. pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
  27. pulumi_gcp/bigtable/app_profile.py +14 -49
  28. pulumi_gcp/bigtable/table.py +42 -42
  29. pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
  30. pulumi_gcp/chronicle/_inputs.py +6 -5
  31. pulumi_gcp/chronicle/outputs.py +4 -3
  32. pulumi_gcp/chronicle/reference_list.py +53 -5
  33. pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
  34. pulumi_gcp/cloudbuild/_inputs.py +20 -0
  35. pulumi_gcp/cloudbuild/outputs.py +14 -0
  36. pulumi_gcp/cloudbuild/trigger.py +4 -2
  37. pulumi_gcp/cloudbuild/worker_pool.py +28 -21
  38. pulumi_gcp/cloudfunctions/function.py +4 -8
  39. pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
  40. pulumi_gcp/cloudrunv2/_inputs.py +57 -0
  41. pulumi_gcp/cloudrunv2/get_service.py +12 -1
  42. pulumi_gcp/cloudrunv2/outputs.py +81 -0
  43. pulumi_gcp/cloudrunv2/service.py +54 -0
  44. pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
  45. pulumi_gcp/composer/environment.py +28 -49
  46. pulumi_gcp/compute/_inputs.py +804 -24
  47. pulumi_gcp/compute/backend_bucket.py +14 -0
  48. pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
  49. pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
  50. pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
  51. pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
  52. pulumi_gcp/compute/backend_service_iam_member.py +464 -0
  53. pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
  54. pulumi_gcp/compute/cross_site_network.py +16 -0
  55. pulumi_gcp/compute/future_reservation.py +32 -0
  56. pulumi_gcp/compute/get_region_backend_service.py +12 -1
  57. pulumi_gcp/compute/get_resource_policy.py +2 -20
  58. pulumi_gcp/compute/instance_from_machine_image.py +75 -110
  59. pulumi_gcp/compute/instance_from_template.py +75 -110
  60. pulumi_gcp/compute/instance_group_manager.py +7 -14
  61. pulumi_gcp/compute/instance_template.py +7 -14
  62. pulumi_gcp/compute/interconnect.py +4 -8
  63. pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
  64. pulumi_gcp/compute/machine_image_iam_member.py +8 -4
  65. pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
  66. pulumi_gcp/compute/network_edge_security_service.py +16 -0
  67. pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
  68. pulumi_gcp/compute/outputs.py +671 -16
  69. pulumi_gcp/compute/preview_feature.py +16 -0
  70. pulumi_gcp/compute/public_delegated_prefix.py +42 -0
  71. pulumi_gcp/compute/region_backend_service.py +54 -0
  72. pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
  73. pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
  74. pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
  75. pulumi_gcp/compute/region_instance_group_manager.py +7 -14
  76. pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
  77. pulumi_gcp/compute/region_resize_request.py +24 -0
  78. pulumi_gcp/compute/region_url_map.py +75 -0
  79. pulumi_gcp/compute/wire_group.py +16 -0
  80. pulumi_gcp/container/_inputs.py +446 -18
  81. pulumi_gcp/container/aws_cluster.py +28 -42
  82. pulumi_gcp/container/aws_node_pool.py +28 -42
  83. pulumi_gcp/container/azure_cluster.py +35 -70
  84. pulumi_gcp/container/azure_node_pool.py +28 -42
  85. pulumi_gcp/container/cluster.py +16 -7
  86. pulumi_gcp/container/outputs.py +423 -15
  87. pulumi_gcp/dataflow/flex_template_job.py +10 -0
  88. pulumi_gcp/dataform/repository.py +16 -0
  89. pulumi_gcp/dataform/repository_release_config.py +16 -0
  90. pulumi_gcp/dataform/repository_workflow_config.py +16 -0
  91. pulumi_gcp/dataplex/asset.py +28 -21
  92. pulumi_gcp/dataplex/zone.py +28 -21
  93. pulumi_gcp/dataproc/cluster.py +21 -14
  94. pulumi_gcp/dataproc/workflow_template.py +42 -105
  95. pulumi_gcp/discoveryengine/__init__.py +1 -0
  96. pulumi_gcp/discoveryengine/_inputs.py +94 -0
  97. pulumi_gcp/discoveryengine/acl_config.py +393 -0
  98. pulumi_gcp/discoveryengine/outputs.py +92 -0
  99. pulumi_gcp/firebase/android_app.py +16 -0
  100. pulumi_gcp/firebase/apple_app.py +16 -0
  101. pulumi_gcp/firebase/database_instance.py +16 -0
  102. pulumi_gcp/firebase/extensions_instance.py +12 -0
  103. pulumi_gcp/firebase/get_android_app.py +4 -2
  104. pulumi_gcp/firebase/get_apple_app.py +4 -2
  105. pulumi_gcp/firebase/get_apple_app_config.py +16 -2
  106. pulumi_gcp/firebase/get_hosting_channel.py +4 -2
  107. pulumi_gcp/firebase/hosting_channel.py +20 -0
  108. pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
  109. pulumi_gcp/firebase/hosting_release.py +16 -0
  110. pulumi_gcp/firebase/hosting_site.py +16 -0
  111. pulumi_gcp/firebase/hosting_version.py +16 -0
  112. pulumi_gcp/firebase/storage_bucket.py +18 -0
  113. pulumi_gcp/firestore/index.py +118 -3
  114. pulumi_gcp/folder/service_identity.py +26 -0
  115. pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
  116. pulumi_gcp/healthcare/_inputs.py +205 -0
  117. pulumi_gcp/healthcare/fhir_store.py +128 -0
  118. pulumi_gcp/healthcare/outputs.py +163 -0
  119. pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
  120. pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
  121. pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
  122. pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
  123. pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
  124. pulumi_gcp/iap/__init__.py +4 -0
  125. pulumi_gcp/iap/_inputs.py +130 -0
  126. pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
  127. pulumi_gcp/iap/outputs.py +76 -0
  128. pulumi_gcp/iap/web_forwarding_rule_service_iam_binding.py +1002 -0
  129. pulumi_gcp/iap/web_forwarding_rule_service_iam_member.py +1002 -0
  130. pulumi_gcp/iap/web_forwarding_rule_service_iam_policy.py +821 -0
  131. pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
  132. pulumi_gcp/logging/billing_account_bucket_config.py +7 -21
  133. pulumi_gcp/logging/folder_bucket_config.py +7 -21
  134. pulumi_gcp/logging/organization_bucket_config.py +7 -21
  135. pulumi_gcp/logging/organization_sink.py +7 -7
  136. pulumi_gcp/managedkafka/connect_cluster.py +4 -0
  137. pulumi_gcp/managedkafka/connector.py +4 -0
  138. pulumi_gcp/memorystore/instance.py +14 -14
  139. pulumi_gcp/monitoring/dashboard.py +7 -14
  140. pulumi_gcp/netapp/storage_pool.py +91 -2
  141. pulumi_gcp/netapp/volume.py +47 -0
  142. pulumi_gcp/networkmanagement/__init__.py +1 -0
  143. pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
  144. pulumi_gcp/networksecurity/authorization_policy.py +12 -0
  145. pulumi_gcp/networkservices/gateway.py +7 -7
  146. pulumi_gcp/networkservices/service_lb_policies.py +12 -0
  147. pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
  148. pulumi_gcp/organizations/project.py +7 -21
  149. pulumi_gcp/projects/service.py +0 -7
  150. pulumi_gcp/pulumi-plugin.json +1 -1
  151. pulumi_gcp/resourcemanager/capability.py +16 -0
  152. pulumi_gcp/runtimeconfig/config.py +16 -0
  153. pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
  154. pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
  155. pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
  156. pulumi_gcp/runtimeconfig/variable.py +10 -0
  157. pulumi_gcp/saasruntime/__init__.py +1 -0
  158. pulumi_gcp/saasruntime/_inputs.py +458 -0
  159. pulumi_gcp/saasruntime/outputs.py +392 -0
  160. pulumi_gcp/saasruntime/saa_s.py +4 -0
  161. pulumi_gcp/saasruntime/unit_kind.py +1024 -0
  162. pulumi_gcp/securesourcemanager/instance.py +7 -7
  163. pulumi_gcp/securesourcemanager/repository.py +7 -7
  164. pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
  165. pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
  166. pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
  167. pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
  168. pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
  169. pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
  170. pulumi_gcp/sql/_inputs.py +135 -1
  171. pulumi_gcp/sql/database_instance.py +54 -14
  172. pulumi_gcp/sql/get_database_instance.py +12 -1
  173. pulumi_gcp/sql/outputs.py +265 -3
  174. pulumi_gcp/storage/_inputs.py +246 -0
  175. pulumi_gcp/storage/bucket.py +7 -14
  176. pulumi_gcp/storage/bucket_object.py +0 -9
  177. pulumi_gcp/storage/outputs.py +191 -1
  178. pulumi_gcp/storage/transfer_job.py +47 -0
  179. pulumi_gcp/tpu/v2_queued_resource.py +16 -0
  180. pulumi_gcp/tpu/v2_vm.py +16 -0
  181. pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
  182. pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
  183. pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
  184. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
  185. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
  186. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
  187. pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
  188. pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
  189. pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
  190. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
  191. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
  192. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
  193. pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
  194. pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
  195. pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
  196. pulumi_gcp/vertex/ai_metadata_store.py +16 -0
  197. pulumi_gcp/workstations/workstation.py +16 -0
  198. pulumi_gcp/workstations/workstation_cluster.py +16 -0
  199. pulumi_gcp/workstations/workstation_config.py +16 -0
  200. pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
  201. pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
  202. pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
  203. pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
  204. pulumi_gcp/workstations/workstation_iam_member.py +272 -0
  205. pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
  206. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/METADATA +1 -1
  207. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/RECORD +209 -200
  208. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/WHEEL +0 -0
  209. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/top_level.txt +0 -0
@@ -326,6 +326,250 @@ class RegionBackendServiceIamBinding(pulumi.CustomResource):
326
326
  role: Optional[pulumi.Input[_builtins.str]] = None,
327
327
  __props__=None):
328
328
  """
329
+ Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
330
+
331
+ * `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
332
+ * `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
333
+ * `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
334
+
335
+ A data source can be used to retrieve policy data in advent you do not need creation
336
+
337
+ * `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
338
+
339
+ > **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
340
+
341
+ > **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
342
+
343
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
344
+
345
+ ## compute.RegionBackendServiceIamPolicy
346
+
347
+ ```python
348
+ import pulumi
349
+ import pulumi_gcp as gcp
350
+
351
+ admin = gcp.organizations.get_iam_policy(bindings=[{
352
+ "role": "roles/compute.admin",
353
+ "members": ["user:jane@example.com"],
354
+ }])
355
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
356
+ project=default["project"],
357
+ region=default["region"],
358
+ name=default["name"],
359
+ policy_data=admin.policy_data)
360
+ ```
361
+
362
+ With IAM Conditions:
363
+
364
+ ```python
365
+ import pulumi
366
+ import pulumi_gcp as gcp
367
+
368
+ admin = gcp.organizations.get_iam_policy(bindings=[{
369
+ "role": "roles/compute.admin",
370
+ "members": ["user:jane@example.com"],
371
+ "condition": {
372
+ "title": "expires_after_2019_12_31",
373
+ "description": "Expiring at midnight of 2019-12-31",
374
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
375
+ },
376
+ }])
377
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
378
+ project=default["project"],
379
+ region=default["region"],
380
+ name=default["name"],
381
+ policy_data=admin.policy_data)
382
+ ```
383
+ ## compute.RegionBackendServiceIamBinding
384
+
385
+ ```python
386
+ import pulumi
387
+ import pulumi_gcp as gcp
388
+
389
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
390
+ project=default["project"],
391
+ region=default["region"],
392
+ name=default["name"],
393
+ role="roles/compute.admin",
394
+ members=["user:jane@example.com"])
395
+ ```
396
+
397
+ With IAM Conditions:
398
+
399
+ ```python
400
+ import pulumi
401
+ import pulumi_gcp as gcp
402
+
403
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
404
+ project=default["project"],
405
+ region=default["region"],
406
+ name=default["name"],
407
+ role="roles/compute.admin",
408
+ members=["user:jane@example.com"],
409
+ condition={
410
+ "title": "expires_after_2019_12_31",
411
+ "description": "Expiring at midnight of 2019-12-31",
412
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
413
+ })
414
+ ```
415
+ ## compute.RegionBackendServiceIamMember
416
+
417
+ ```python
418
+ import pulumi
419
+ import pulumi_gcp as gcp
420
+
421
+ member = gcp.compute.RegionBackendServiceIamMember("member",
422
+ project=default["project"],
423
+ region=default["region"],
424
+ name=default["name"],
425
+ role="roles/compute.admin",
426
+ member="user:jane@example.com")
427
+ ```
428
+
429
+ With IAM Conditions:
430
+
431
+ ```python
432
+ import pulumi
433
+ import pulumi_gcp as gcp
434
+
435
+ member = gcp.compute.RegionBackendServiceIamMember("member",
436
+ project=default["project"],
437
+ region=default["region"],
438
+ name=default["name"],
439
+ role="roles/compute.admin",
440
+ member="user:jane@example.com",
441
+ condition={
442
+ "title": "expires_after_2019_12_31",
443
+ "description": "Expiring at midnight of 2019-12-31",
444
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
445
+ })
446
+ ```
447
+
448
+ ## This resource supports User Project Overrides.
449
+
450
+ -
451
+
452
+ # IAM policy for Compute Engine RegionBackendService
453
+
454
+ Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
455
+
456
+ * `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
457
+ * `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
458
+ * `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
459
+
460
+ A data source can be used to retrieve policy data in advent you do not need creation
461
+
462
+ * `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
463
+
464
+ > **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
465
+
466
+ > **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
467
+
468
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
469
+
470
+ ## compute.RegionBackendServiceIamPolicy
471
+
472
+ ```python
473
+ import pulumi
474
+ import pulumi_gcp as gcp
475
+
476
+ admin = gcp.organizations.get_iam_policy(bindings=[{
477
+ "role": "roles/compute.admin",
478
+ "members": ["user:jane@example.com"],
479
+ }])
480
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
481
+ project=default["project"],
482
+ region=default["region"],
483
+ name=default["name"],
484
+ policy_data=admin.policy_data)
485
+ ```
486
+
487
+ With IAM Conditions:
488
+
489
+ ```python
490
+ import pulumi
491
+ import pulumi_gcp as gcp
492
+
493
+ admin = gcp.organizations.get_iam_policy(bindings=[{
494
+ "role": "roles/compute.admin",
495
+ "members": ["user:jane@example.com"],
496
+ "condition": {
497
+ "title": "expires_after_2019_12_31",
498
+ "description": "Expiring at midnight of 2019-12-31",
499
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
500
+ },
501
+ }])
502
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
503
+ project=default["project"],
504
+ region=default["region"],
505
+ name=default["name"],
506
+ policy_data=admin.policy_data)
507
+ ```
508
+ ## compute.RegionBackendServiceIamBinding
509
+
510
+ ```python
511
+ import pulumi
512
+ import pulumi_gcp as gcp
513
+
514
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
515
+ project=default["project"],
516
+ region=default["region"],
517
+ name=default["name"],
518
+ role="roles/compute.admin",
519
+ members=["user:jane@example.com"])
520
+ ```
521
+
522
+ With IAM Conditions:
523
+
524
+ ```python
525
+ import pulumi
526
+ import pulumi_gcp as gcp
527
+
528
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
529
+ project=default["project"],
530
+ region=default["region"],
531
+ name=default["name"],
532
+ role="roles/compute.admin",
533
+ members=["user:jane@example.com"],
534
+ condition={
535
+ "title": "expires_after_2019_12_31",
536
+ "description": "Expiring at midnight of 2019-12-31",
537
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
538
+ })
539
+ ```
540
+ ## compute.RegionBackendServiceIamMember
541
+
542
+ ```python
543
+ import pulumi
544
+ import pulumi_gcp as gcp
545
+
546
+ member = gcp.compute.RegionBackendServiceIamMember("member",
547
+ project=default["project"],
548
+ region=default["region"],
549
+ name=default["name"],
550
+ role="roles/compute.admin",
551
+ member="user:jane@example.com")
552
+ ```
553
+
554
+ With IAM Conditions:
555
+
556
+ ```python
557
+ import pulumi
558
+ import pulumi_gcp as gcp
559
+
560
+ member = gcp.compute.RegionBackendServiceIamMember("member",
561
+ project=default["project"],
562
+ region=default["region"],
563
+ name=default["name"],
564
+ role="roles/compute.admin",
565
+ member="user:jane@example.com",
566
+ condition={
567
+ "title": "expires_after_2019_12_31",
568
+ "description": "Expiring at midnight of 2019-12-31",
569
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
570
+ })
571
+ ```
572
+
329
573
  ## Import
330
574
 
331
575
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -398,6 +642,250 @@ class RegionBackendServiceIamBinding(pulumi.CustomResource):
398
642
  args: RegionBackendServiceIamBindingArgs,
399
643
  opts: Optional[pulumi.ResourceOptions] = None):
400
644
  """
645
+ Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
646
+
647
+ * `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
648
+ * `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
649
+ * `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
650
+
651
+ A data source can be used to retrieve policy data in advent you do not need creation
652
+
653
+ * `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
654
+
655
+ > **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
656
+
657
+ > **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
658
+
659
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
660
+
661
+ ## compute.RegionBackendServiceIamPolicy
662
+
663
+ ```python
664
+ import pulumi
665
+ import pulumi_gcp as gcp
666
+
667
+ admin = gcp.organizations.get_iam_policy(bindings=[{
668
+ "role": "roles/compute.admin",
669
+ "members": ["user:jane@example.com"],
670
+ }])
671
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
672
+ project=default["project"],
673
+ region=default["region"],
674
+ name=default["name"],
675
+ policy_data=admin.policy_data)
676
+ ```
677
+
678
+ With IAM Conditions:
679
+
680
+ ```python
681
+ import pulumi
682
+ import pulumi_gcp as gcp
683
+
684
+ admin = gcp.organizations.get_iam_policy(bindings=[{
685
+ "role": "roles/compute.admin",
686
+ "members": ["user:jane@example.com"],
687
+ "condition": {
688
+ "title": "expires_after_2019_12_31",
689
+ "description": "Expiring at midnight of 2019-12-31",
690
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
691
+ },
692
+ }])
693
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
694
+ project=default["project"],
695
+ region=default["region"],
696
+ name=default["name"],
697
+ policy_data=admin.policy_data)
698
+ ```
699
+ ## compute.RegionBackendServiceIamBinding
700
+
701
+ ```python
702
+ import pulumi
703
+ import pulumi_gcp as gcp
704
+
705
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
706
+ project=default["project"],
707
+ region=default["region"],
708
+ name=default["name"],
709
+ role="roles/compute.admin",
710
+ members=["user:jane@example.com"])
711
+ ```
712
+
713
+ With IAM Conditions:
714
+
715
+ ```python
716
+ import pulumi
717
+ import pulumi_gcp as gcp
718
+
719
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
720
+ project=default["project"],
721
+ region=default["region"],
722
+ name=default["name"],
723
+ role="roles/compute.admin",
724
+ members=["user:jane@example.com"],
725
+ condition={
726
+ "title": "expires_after_2019_12_31",
727
+ "description": "Expiring at midnight of 2019-12-31",
728
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
729
+ })
730
+ ```
731
+ ## compute.RegionBackendServiceIamMember
732
+
733
+ ```python
734
+ import pulumi
735
+ import pulumi_gcp as gcp
736
+
737
+ member = gcp.compute.RegionBackendServiceIamMember("member",
738
+ project=default["project"],
739
+ region=default["region"],
740
+ name=default["name"],
741
+ role="roles/compute.admin",
742
+ member="user:jane@example.com")
743
+ ```
744
+
745
+ With IAM Conditions:
746
+
747
+ ```python
748
+ import pulumi
749
+ import pulumi_gcp as gcp
750
+
751
+ member = gcp.compute.RegionBackendServiceIamMember("member",
752
+ project=default["project"],
753
+ region=default["region"],
754
+ name=default["name"],
755
+ role="roles/compute.admin",
756
+ member="user:jane@example.com",
757
+ condition={
758
+ "title": "expires_after_2019_12_31",
759
+ "description": "Expiring at midnight of 2019-12-31",
760
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
761
+ })
762
+ ```
763
+
764
+ ## This resource supports User Project Overrides.
765
+
766
+ -
767
+
768
+ # IAM policy for Compute Engine RegionBackendService
769
+
770
+ Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
771
+
772
+ * `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
773
+ * `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
774
+ * `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
775
+
776
+ A data source can be used to retrieve policy data in advent you do not need creation
777
+
778
+ * `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
779
+
780
+ > **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
781
+
782
+ > **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
783
+
784
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
785
+
786
+ ## compute.RegionBackendServiceIamPolicy
787
+
788
+ ```python
789
+ import pulumi
790
+ import pulumi_gcp as gcp
791
+
792
+ admin = gcp.organizations.get_iam_policy(bindings=[{
793
+ "role": "roles/compute.admin",
794
+ "members": ["user:jane@example.com"],
795
+ }])
796
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
797
+ project=default["project"],
798
+ region=default["region"],
799
+ name=default["name"],
800
+ policy_data=admin.policy_data)
801
+ ```
802
+
803
+ With IAM Conditions:
804
+
805
+ ```python
806
+ import pulumi
807
+ import pulumi_gcp as gcp
808
+
809
+ admin = gcp.organizations.get_iam_policy(bindings=[{
810
+ "role": "roles/compute.admin",
811
+ "members": ["user:jane@example.com"],
812
+ "condition": {
813
+ "title": "expires_after_2019_12_31",
814
+ "description": "Expiring at midnight of 2019-12-31",
815
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
816
+ },
817
+ }])
818
+ policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
819
+ project=default["project"],
820
+ region=default["region"],
821
+ name=default["name"],
822
+ policy_data=admin.policy_data)
823
+ ```
824
+ ## compute.RegionBackendServiceIamBinding
825
+
826
+ ```python
827
+ import pulumi
828
+ import pulumi_gcp as gcp
829
+
830
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
831
+ project=default["project"],
832
+ region=default["region"],
833
+ name=default["name"],
834
+ role="roles/compute.admin",
835
+ members=["user:jane@example.com"])
836
+ ```
837
+
838
+ With IAM Conditions:
839
+
840
+ ```python
841
+ import pulumi
842
+ import pulumi_gcp as gcp
843
+
844
+ binding = gcp.compute.RegionBackendServiceIamBinding("binding",
845
+ project=default["project"],
846
+ region=default["region"],
847
+ name=default["name"],
848
+ role="roles/compute.admin",
849
+ members=["user:jane@example.com"],
850
+ condition={
851
+ "title": "expires_after_2019_12_31",
852
+ "description": "Expiring at midnight of 2019-12-31",
853
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
854
+ })
855
+ ```
856
+ ## compute.RegionBackendServiceIamMember
857
+
858
+ ```python
859
+ import pulumi
860
+ import pulumi_gcp as gcp
861
+
862
+ member = gcp.compute.RegionBackendServiceIamMember("member",
863
+ project=default["project"],
864
+ region=default["region"],
865
+ name=default["name"],
866
+ role="roles/compute.admin",
867
+ member="user:jane@example.com")
868
+ ```
869
+
870
+ With IAM Conditions:
871
+
872
+ ```python
873
+ import pulumi
874
+ import pulumi_gcp as gcp
875
+
876
+ member = gcp.compute.RegionBackendServiceIamMember("member",
877
+ project=default["project"],
878
+ region=default["region"],
879
+ name=default["name"],
880
+ role="roles/compute.admin",
881
+ member="user:jane@example.com",
882
+ condition={
883
+ "title": "expires_after_2019_12_31",
884
+ "description": "Expiring at midnight of 2019-12-31",
885
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
886
+ })
887
+ ```
888
+
401
889
  ## Import
402
890
 
403
891
  For all import syntaxes, the "resource in question" can take any of the following forms: