pulumi-gcp 9.0.0a1__py3-none-any.whl → 9.0.0a1758219982__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (209) hide show
  1. pulumi_gcp/__init__.py +48 -0
  2. pulumi_gcp/activedirectory/peering.py +16 -0
  3. pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
  4. pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
  5. pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
  6. pulumi_gcp/apigateway/api_iam_binding.py +4 -4
  7. pulumi_gcp/apigateway/api_iam_member.py +4 -4
  8. pulumi_gcp/apigateway/api_iam_policy.py +4 -4
  9. pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
  10. pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
  11. pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
  12. pulumi_gcp/artifactregistry/__init__.py +1 -0
  13. pulumi_gcp/artifactregistry/get_python_package.py +237 -0
  14. pulumi_gcp/artifactregistry/get_repository.py +12 -1
  15. pulumi_gcp/artifactregistry/repository.py +28 -0
  16. pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
  17. pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
  18. pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
  19. pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
  20. pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
  21. pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
  22. pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
  23. pulumi_gcp/bigquery/app_profile.py +14 -49
  24. pulumi_gcp/bigquery/dataset_access.py +4 -8
  25. pulumi_gcp/bigquery/table.py +7 -21
  26. pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
  27. pulumi_gcp/bigtable/app_profile.py +14 -49
  28. pulumi_gcp/bigtable/table.py +42 -42
  29. pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
  30. pulumi_gcp/chronicle/_inputs.py +6 -5
  31. pulumi_gcp/chronicle/outputs.py +4 -3
  32. pulumi_gcp/chronicle/reference_list.py +53 -5
  33. pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
  34. pulumi_gcp/cloudbuild/_inputs.py +20 -0
  35. pulumi_gcp/cloudbuild/outputs.py +14 -0
  36. pulumi_gcp/cloudbuild/trigger.py +4 -2
  37. pulumi_gcp/cloudbuild/worker_pool.py +28 -21
  38. pulumi_gcp/cloudfunctions/function.py +4 -8
  39. pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
  40. pulumi_gcp/cloudrunv2/_inputs.py +57 -0
  41. pulumi_gcp/cloudrunv2/get_service.py +12 -1
  42. pulumi_gcp/cloudrunv2/outputs.py +81 -0
  43. pulumi_gcp/cloudrunv2/service.py +54 -0
  44. pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
  45. pulumi_gcp/composer/environment.py +28 -49
  46. pulumi_gcp/compute/_inputs.py +804 -24
  47. pulumi_gcp/compute/backend_bucket.py +14 -0
  48. pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
  49. pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
  50. pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
  51. pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
  52. pulumi_gcp/compute/backend_service_iam_member.py +464 -0
  53. pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
  54. pulumi_gcp/compute/cross_site_network.py +16 -0
  55. pulumi_gcp/compute/future_reservation.py +32 -0
  56. pulumi_gcp/compute/get_region_backend_service.py +12 -1
  57. pulumi_gcp/compute/get_resource_policy.py +2 -20
  58. pulumi_gcp/compute/instance_from_machine_image.py +75 -110
  59. pulumi_gcp/compute/instance_from_template.py +75 -110
  60. pulumi_gcp/compute/instance_group_manager.py +7 -14
  61. pulumi_gcp/compute/instance_template.py +7 -14
  62. pulumi_gcp/compute/interconnect.py +4 -8
  63. pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
  64. pulumi_gcp/compute/machine_image_iam_member.py +8 -4
  65. pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
  66. pulumi_gcp/compute/network_edge_security_service.py +16 -0
  67. pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
  68. pulumi_gcp/compute/outputs.py +671 -16
  69. pulumi_gcp/compute/preview_feature.py +16 -0
  70. pulumi_gcp/compute/public_delegated_prefix.py +42 -0
  71. pulumi_gcp/compute/region_backend_service.py +54 -0
  72. pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
  73. pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
  74. pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
  75. pulumi_gcp/compute/region_instance_group_manager.py +7 -14
  76. pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
  77. pulumi_gcp/compute/region_resize_request.py +24 -0
  78. pulumi_gcp/compute/region_url_map.py +75 -0
  79. pulumi_gcp/compute/wire_group.py +16 -0
  80. pulumi_gcp/container/_inputs.py +446 -18
  81. pulumi_gcp/container/aws_cluster.py +28 -42
  82. pulumi_gcp/container/aws_node_pool.py +28 -42
  83. pulumi_gcp/container/azure_cluster.py +35 -70
  84. pulumi_gcp/container/azure_node_pool.py +28 -42
  85. pulumi_gcp/container/cluster.py +16 -7
  86. pulumi_gcp/container/outputs.py +423 -15
  87. pulumi_gcp/dataflow/flex_template_job.py +10 -0
  88. pulumi_gcp/dataform/repository.py +16 -0
  89. pulumi_gcp/dataform/repository_release_config.py +16 -0
  90. pulumi_gcp/dataform/repository_workflow_config.py +16 -0
  91. pulumi_gcp/dataplex/asset.py +28 -21
  92. pulumi_gcp/dataplex/zone.py +28 -21
  93. pulumi_gcp/dataproc/cluster.py +21 -14
  94. pulumi_gcp/dataproc/workflow_template.py +42 -105
  95. pulumi_gcp/discoveryengine/__init__.py +1 -0
  96. pulumi_gcp/discoveryengine/_inputs.py +94 -0
  97. pulumi_gcp/discoveryengine/acl_config.py +393 -0
  98. pulumi_gcp/discoveryengine/outputs.py +92 -0
  99. pulumi_gcp/firebase/android_app.py +16 -0
  100. pulumi_gcp/firebase/apple_app.py +16 -0
  101. pulumi_gcp/firebase/database_instance.py +16 -0
  102. pulumi_gcp/firebase/extensions_instance.py +12 -0
  103. pulumi_gcp/firebase/get_android_app.py +4 -2
  104. pulumi_gcp/firebase/get_apple_app.py +4 -2
  105. pulumi_gcp/firebase/get_apple_app_config.py +16 -2
  106. pulumi_gcp/firebase/get_hosting_channel.py +4 -2
  107. pulumi_gcp/firebase/hosting_channel.py +20 -0
  108. pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
  109. pulumi_gcp/firebase/hosting_release.py +16 -0
  110. pulumi_gcp/firebase/hosting_site.py +16 -0
  111. pulumi_gcp/firebase/hosting_version.py +16 -0
  112. pulumi_gcp/firebase/storage_bucket.py +18 -0
  113. pulumi_gcp/firestore/index.py +118 -3
  114. pulumi_gcp/folder/service_identity.py +26 -0
  115. pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
  116. pulumi_gcp/healthcare/_inputs.py +205 -0
  117. pulumi_gcp/healthcare/fhir_store.py +128 -0
  118. pulumi_gcp/healthcare/outputs.py +163 -0
  119. pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
  120. pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
  121. pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
  122. pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
  123. pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
  124. pulumi_gcp/iap/__init__.py +4 -0
  125. pulumi_gcp/iap/_inputs.py +130 -0
  126. pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
  127. pulumi_gcp/iap/outputs.py +76 -0
  128. pulumi_gcp/iap/web_forwarding_rule_service_iam_binding.py +1002 -0
  129. pulumi_gcp/iap/web_forwarding_rule_service_iam_member.py +1002 -0
  130. pulumi_gcp/iap/web_forwarding_rule_service_iam_policy.py +821 -0
  131. pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
  132. pulumi_gcp/logging/billing_account_bucket_config.py +7 -21
  133. pulumi_gcp/logging/folder_bucket_config.py +7 -21
  134. pulumi_gcp/logging/organization_bucket_config.py +7 -21
  135. pulumi_gcp/logging/organization_sink.py +7 -7
  136. pulumi_gcp/managedkafka/connect_cluster.py +4 -0
  137. pulumi_gcp/managedkafka/connector.py +4 -0
  138. pulumi_gcp/memorystore/instance.py +14 -14
  139. pulumi_gcp/monitoring/dashboard.py +7 -14
  140. pulumi_gcp/netapp/storage_pool.py +91 -2
  141. pulumi_gcp/netapp/volume.py +47 -0
  142. pulumi_gcp/networkmanagement/__init__.py +1 -0
  143. pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
  144. pulumi_gcp/networksecurity/authorization_policy.py +12 -0
  145. pulumi_gcp/networkservices/gateway.py +7 -7
  146. pulumi_gcp/networkservices/service_lb_policies.py +12 -0
  147. pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
  148. pulumi_gcp/organizations/project.py +7 -21
  149. pulumi_gcp/projects/service.py +0 -7
  150. pulumi_gcp/pulumi-plugin.json +1 -1
  151. pulumi_gcp/resourcemanager/capability.py +16 -0
  152. pulumi_gcp/runtimeconfig/config.py +16 -0
  153. pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
  154. pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
  155. pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
  156. pulumi_gcp/runtimeconfig/variable.py +10 -0
  157. pulumi_gcp/saasruntime/__init__.py +1 -0
  158. pulumi_gcp/saasruntime/_inputs.py +458 -0
  159. pulumi_gcp/saasruntime/outputs.py +392 -0
  160. pulumi_gcp/saasruntime/saa_s.py +4 -0
  161. pulumi_gcp/saasruntime/unit_kind.py +1024 -0
  162. pulumi_gcp/securesourcemanager/instance.py +7 -7
  163. pulumi_gcp/securesourcemanager/repository.py +7 -7
  164. pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
  165. pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
  166. pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
  167. pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
  168. pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
  169. pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
  170. pulumi_gcp/sql/_inputs.py +135 -1
  171. pulumi_gcp/sql/database_instance.py +54 -14
  172. pulumi_gcp/sql/get_database_instance.py +12 -1
  173. pulumi_gcp/sql/outputs.py +265 -3
  174. pulumi_gcp/storage/_inputs.py +246 -0
  175. pulumi_gcp/storage/bucket.py +7 -14
  176. pulumi_gcp/storage/bucket_object.py +0 -9
  177. pulumi_gcp/storage/outputs.py +191 -1
  178. pulumi_gcp/storage/transfer_job.py +47 -0
  179. pulumi_gcp/tpu/v2_queued_resource.py +16 -0
  180. pulumi_gcp/tpu/v2_vm.py +16 -0
  181. pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
  182. pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
  183. pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
  184. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
  185. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
  186. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
  187. pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
  188. pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
  189. pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
  190. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
  191. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
  192. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
  193. pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
  194. pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
  195. pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
  196. pulumi_gcp/vertex/ai_metadata_store.py +16 -0
  197. pulumi_gcp/workstations/workstation.py +16 -0
  198. pulumi_gcp/workstations/workstation_cluster.py +16 -0
  199. pulumi_gcp/workstations/workstation_config.py +16 -0
  200. pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
  201. pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
  202. pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
  203. pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
  204. pulumi_gcp/workstations/workstation_iam_member.py +272 -0
  205. pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
  206. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/METADATA +1 -1
  207. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/RECORD +209 -200
  208. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/WHEEL +0 -0
  209. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/top_level.txt +0 -0
@@ -44,8 +44,10 @@ class BackendBucketArgs:
44
44
  client when the resource is created.
45
45
  :param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
46
46
  :param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
47
+ Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
47
48
  :param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
48
49
  If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
50
+ Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
49
51
  Possible values are: `INTERNAL_MANAGED`.
50
52
  :param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
51
53
  created. The name must be 1-63 characters long, and comply with
@@ -161,6 +163,7 @@ class BackendBucketArgs:
161
163
  def enable_cdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
162
164
  """
163
165
  If true, enable Cloud CDN for this BackendBucket.
166
+ Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
164
167
  """
165
168
  return pulumi.get(self, "enable_cdn")
166
169
 
@@ -174,6 +177,7 @@ class BackendBucketArgs:
174
177
  """
175
178
  The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
176
179
  If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
180
+ Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
177
181
  Possible values are: `INTERNAL_MANAGED`.
178
182
  """
179
183
  return pulumi.get(self, "load_balancing_scheme")
@@ -256,8 +260,10 @@ class _BackendBucketState:
256
260
  client when the resource is created.
257
261
  :param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
258
262
  :param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
263
+ Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
259
264
  :param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
260
265
  If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
266
+ Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
261
267
  Possible values are: `INTERNAL_MANAGED`.
262
268
  :param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
263
269
  created. The name must be 1-63 characters long, and comply with
@@ -391,6 +397,7 @@ class _BackendBucketState:
391
397
  def enable_cdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
392
398
  """
393
399
  If true, enable Cloud CDN for this BackendBucket.
400
+ Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
394
401
  """
395
402
  return pulumi.get(self, "enable_cdn")
396
403
 
@@ -404,6 +411,7 @@ class _BackendBucketState:
404
411
  """
405
412
  The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
406
413
  If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
414
+ Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
407
415
  Possible values are: `INTERNAL_MANAGED`.
408
416
  """
409
417
  return pulumi.get(self, "load_balancing_scheme")
@@ -616,8 +624,10 @@ class BackendBucket(pulumi.CustomResource):
616
624
  client when the resource is created.
617
625
  :param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
618
626
  :param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
627
+ Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
619
628
  :param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
620
629
  If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
630
+ Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
621
631
  Possible values are: `INTERNAL_MANAGED`.
622
632
  :param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
623
633
  created. The name must be 1-63 characters long, and comply with
@@ -845,8 +855,10 @@ class BackendBucket(pulumi.CustomResource):
845
855
  client when the resource is created.
846
856
  :param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
847
857
  :param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
858
+ Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
848
859
  :param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
849
860
  If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
861
+ Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
850
862
  Possible values are: `INTERNAL_MANAGED`.
851
863
  :param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
852
864
  created. The name must be 1-63 characters long, and comply with
@@ -944,6 +956,7 @@ class BackendBucket(pulumi.CustomResource):
944
956
  def enable_cdn(self) -> pulumi.Output[Optional[_builtins.bool]]:
945
957
  """
946
958
  If true, enable Cloud CDN for this BackendBucket.
959
+ Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
947
960
  """
948
961
  return pulumi.get(self, "enable_cdn")
949
962
 
@@ -953,6 +966,7 @@ class BackendBucket(pulumi.CustomResource):
953
966
  """
954
967
  The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
955
968
  If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
969
+ Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
956
970
  Possible values are: `INTERNAL_MANAGED`.
957
971
  """
958
972
  return pulumi.get(self, "load_balancing_scheme")
@@ -265,6 +265,124 @@ class BackendBucketIamBinding(pulumi.CustomResource):
265
265
  role: Optional[pulumi.Input[_builtins.str]] = None,
266
266
  __props__=None):
267
267
  """
268
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
269
+
270
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
271
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
272
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
273
+
274
+ A data source can be used to retrieve policy data in advent you do not need creation
275
+
276
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
277
+
278
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
279
+
280
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
281
+
282
+ ## compute.BackendBucketIamPolicy
283
+
284
+ ```python
285
+ import pulumi
286
+ import pulumi_gcp as gcp
287
+
288
+ admin = gcp.organizations.get_iam_policy(bindings=[{
289
+ "role": "roles/viewer",
290
+ "members": ["user:jane@example.com"],
291
+ }])
292
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
293
+ project=image_backend["project"],
294
+ name=image_backend["name"],
295
+ policy_data=admin.policy_data)
296
+ ```
297
+
298
+ ## compute.BackendBucketIamBinding
299
+
300
+ ```python
301
+ import pulumi
302
+ import pulumi_gcp as gcp
303
+
304
+ binding = gcp.compute.BackendBucketIamBinding("binding",
305
+ project=image_backend["project"],
306
+ name=image_backend["name"],
307
+ role="roles/viewer",
308
+ members=["user:jane@example.com"])
309
+ ```
310
+
311
+ ## compute.BackendBucketIamMember
312
+
313
+ ```python
314
+ import pulumi
315
+ import pulumi_gcp as gcp
316
+
317
+ member = gcp.compute.BackendBucketIamMember("member",
318
+ project=image_backend["project"],
319
+ name=image_backend["name"],
320
+ role="roles/viewer",
321
+ member="user:jane@example.com")
322
+ ```
323
+
324
+ ## This resource supports User Project Overrides.
325
+
326
+ -
327
+
328
+ # IAM policy for Compute Engine BackendBucket
329
+
330
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
331
+
332
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
333
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
334
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
335
+
336
+ A data source can be used to retrieve policy data in advent you do not need creation
337
+
338
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
339
+
340
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
341
+
342
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
343
+
344
+ ## compute.BackendBucketIamPolicy
345
+
346
+ ```python
347
+ import pulumi
348
+ import pulumi_gcp as gcp
349
+
350
+ admin = gcp.organizations.get_iam_policy(bindings=[{
351
+ "role": "roles/viewer",
352
+ "members": ["user:jane@example.com"],
353
+ }])
354
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
355
+ project=image_backend["project"],
356
+ name=image_backend["name"],
357
+ policy_data=admin.policy_data)
358
+ ```
359
+
360
+ ## compute.BackendBucketIamBinding
361
+
362
+ ```python
363
+ import pulumi
364
+ import pulumi_gcp as gcp
365
+
366
+ binding = gcp.compute.BackendBucketIamBinding("binding",
367
+ project=image_backend["project"],
368
+ name=image_backend["name"],
369
+ role="roles/viewer",
370
+ members=["user:jane@example.com"])
371
+ ```
372
+
373
+ ## compute.BackendBucketIamMember
374
+
375
+ ```python
376
+ import pulumi
377
+ import pulumi_gcp as gcp
378
+
379
+ member = gcp.compute.BackendBucketIamMember("member",
380
+ project=image_backend["project"],
381
+ name=image_backend["name"],
382
+ role="roles/viewer",
383
+ member="user:jane@example.com")
384
+ ```
385
+
268
386
  ## Import
269
387
 
270
388
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -328,6 +446,124 @@ class BackendBucketIamBinding(pulumi.CustomResource):
328
446
  args: BackendBucketIamBindingArgs,
329
447
  opts: Optional[pulumi.ResourceOptions] = None):
330
448
  """
449
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
450
+
451
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
452
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
453
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
454
+
455
+ A data source can be used to retrieve policy data in advent you do not need creation
456
+
457
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
458
+
459
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
460
+
461
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
462
+
463
+ ## compute.BackendBucketIamPolicy
464
+
465
+ ```python
466
+ import pulumi
467
+ import pulumi_gcp as gcp
468
+
469
+ admin = gcp.organizations.get_iam_policy(bindings=[{
470
+ "role": "roles/viewer",
471
+ "members": ["user:jane@example.com"],
472
+ }])
473
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
474
+ project=image_backend["project"],
475
+ name=image_backend["name"],
476
+ policy_data=admin.policy_data)
477
+ ```
478
+
479
+ ## compute.BackendBucketIamBinding
480
+
481
+ ```python
482
+ import pulumi
483
+ import pulumi_gcp as gcp
484
+
485
+ binding = gcp.compute.BackendBucketIamBinding("binding",
486
+ project=image_backend["project"],
487
+ name=image_backend["name"],
488
+ role="roles/viewer",
489
+ members=["user:jane@example.com"])
490
+ ```
491
+
492
+ ## compute.BackendBucketIamMember
493
+
494
+ ```python
495
+ import pulumi
496
+ import pulumi_gcp as gcp
497
+
498
+ member = gcp.compute.BackendBucketIamMember("member",
499
+ project=image_backend["project"],
500
+ name=image_backend["name"],
501
+ role="roles/viewer",
502
+ member="user:jane@example.com")
503
+ ```
504
+
505
+ ## This resource supports User Project Overrides.
506
+
507
+ -
508
+
509
+ # IAM policy for Compute Engine BackendBucket
510
+
511
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
512
+
513
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
514
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
515
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
516
+
517
+ A data source can be used to retrieve policy data in advent you do not need creation
518
+
519
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
520
+
521
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
522
+
523
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
524
+
525
+ ## compute.BackendBucketIamPolicy
526
+
527
+ ```python
528
+ import pulumi
529
+ import pulumi_gcp as gcp
530
+
531
+ admin = gcp.organizations.get_iam_policy(bindings=[{
532
+ "role": "roles/viewer",
533
+ "members": ["user:jane@example.com"],
534
+ }])
535
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
536
+ project=image_backend["project"],
537
+ name=image_backend["name"],
538
+ policy_data=admin.policy_data)
539
+ ```
540
+
541
+ ## compute.BackendBucketIamBinding
542
+
543
+ ```python
544
+ import pulumi
545
+ import pulumi_gcp as gcp
546
+
547
+ binding = gcp.compute.BackendBucketIamBinding("binding",
548
+ project=image_backend["project"],
549
+ name=image_backend["name"],
550
+ role="roles/viewer",
551
+ members=["user:jane@example.com"])
552
+ ```
553
+
554
+ ## compute.BackendBucketIamMember
555
+
556
+ ```python
557
+ import pulumi
558
+ import pulumi_gcp as gcp
559
+
560
+ member = gcp.compute.BackendBucketIamMember("member",
561
+ project=image_backend["project"],
562
+ name=image_backend["name"],
563
+ role="roles/viewer",
564
+ member="user:jane@example.com")
565
+ ```
566
+
331
567
  ## Import
332
568
 
333
569
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -265,6 +265,124 @@ class BackendBucketIamMember(pulumi.CustomResource):
265
265
  role: Optional[pulumi.Input[_builtins.str]] = None,
266
266
  __props__=None):
267
267
  """
268
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
269
+
270
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
271
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
272
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
273
+
274
+ A data source can be used to retrieve policy data in advent you do not need creation
275
+
276
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
277
+
278
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
279
+
280
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
281
+
282
+ ## compute.BackendBucketIamPolicy
283
+
284
+ ```python
285
+ import pulumi
286
+ import pulumi_gcp as gcp
287
+
288
+ admin = gcp.organizations.get_iam_policy(bindings=[{
289
+ "role": "roles/viewer",
290
+ "members": ["user:jane@example.com"],
291
+ }])
292
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
293
+ project=image_backend["project"],
294
+ name=image_backend["name"],
295
+ policy_data=admin.policy_data)
296
+ ```
297
+
298
+ ## compute.BackendBucketIamBinding
299
+
300
+ ```python
301
+ import pulumi
302
+ import pulumi_gcp as gcp
303
+
304
+ binding = gcp.compute.BackendBucketIamBinding("binding",
305
+ project=image_backend["project"],
306
+ name=image_backend["name"],
307
+ role="roles/viewer",
308
+ members=["user:jane@example.com"])
309
+ ```
310
+
311
+ ## compute.BackendBucketIamMember
312
+
313
+ ```python
314
+ import pulumi
315
+ import pulumi_gcp as gcp
316
+
317
+ member = gcp.compute.BackendBucketIamMember("member",
318
+ project=image_backend["project"],
319
+ name=image_backend["name"],
320
+ role="roles/viewer",
321
+ member="user:jane@example.com")
322
+ ```
323
+
324
+ ## This resource supports User Project Overrides.
325
+
326
+ -
327
+
328
+ # IAM policy for Compute Engine BackendBucket
329
+
330
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
331
+
332
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
333
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
334
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
335
+
336
+ A data source can be used to retrieve policy data in advent you do not need creation
337
+
338
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
339
+
340
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
341
+
342
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
343
+
344
+ ## compute.BackendBucketIamPolicy
345
+
346
+ ```python
347
+ import pulumi
348
+ import pulumi_gcp as gcp
349
+
350
+ admin = gcp.organizations.get_iam_policy(bindings=[{
351
+ "role": "roles/viewer",
352
+ "members": ["user:jane@example.com"],
353
+ }])
354
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
355
+ project=image_backend["project"],
356
+ name=image_backend["name"],
357
+ policy_data=admin.policy_data)
358
+ ```
359
+
360
+ ## compute.BackendBucketIamBinding
361
+
362
+ ```python
363
+ import pulumi
364
+ import pulumi_gcp as gcp
365
+
366
+ binding = gcp.compute.BackendBucketIamBinding("binding",
367
+ project=image_backend["project"],
368
+ name=image_backend["name"],
369
+ role="roles/viewer",
370
+ members=["user:jane@example.com"])
371
+ ```
372
+
373
+ ## compute.BackendBucketIamMember
374
+
375
+ ```python
376
+ import pulumi
377
+ import pulumi_gcp as gcp
378
+
379
+ member = gcp.compute.BackendBucketIamMember("member",
380
+ project=image_backend["project"],
381
+ name=image_backend["name"],
382
+ role="roles/viewer",
383
+ member="user:jane@example.com")
384
+ ```
385
+
268
386
  ## Import
269
387
 
270
388
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -328,6 +446,124 @@ class BackendBucketIamMember(pulumi.CustomResource):
328
446
  args: BackendBucketIamMemberArgs,
329
447
  opts: Optional[pulumi.ResourceOptions] = None):
330
448
  """
449
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
450
+
451
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
452
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
453
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
454
+
455
+ A data source can be used to retrieve policy data in advent you do not need creation
456
+
457
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
458
+
459
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
460
+
461
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
462
+
463
+ ## compute.BackendBucketIamPolicy
464
+
465
+ ```python
466
+ import pulumi
467
+ import pulumi_gcp as gcp
468
+
469
+ admin = gcp.organizations.get_iam_policy(bindings=[{
470
+ "role": "roles/viewer",
471
+ "members": ["user:jane@example.com"],
472
+ }])
473
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
474
+ project=image_backend["project"],
475
+ name=image_backend["name"],
476
+ policy_data=admin.policy_data)
477
+ ```
478
+
479
+ ## compute.BackendBucketIamBinding
480
+
481
+ ```python
482
+ import pulumi
483
+ import pulumi_gcp as gcp
484
+
485
+ binding = gcp.compute.BackendBucketIamBinding("binding",
486
+ project=image_backend["project"],
487
+ name=image_backend["name"],
488
+ role="roles/viewer",
489
+ members=["user:jane@example.com"])
490
+ ```
491
+
492
+ ## compute.BackendBucketIamMember
493
+
494
+ ```python
495
+ import pulumi
496
+ import pulumi_gcp as gcp
497
+
498
+ member = gcp.compute.BackendBucketIamMember("member",
499
+ project=image_backend["project"],
500
+ name=image_backend["name"],
501
+ role="roles/viewer",
502
+ member="user:jane@example.com")
503
+ ```
504
+
505
+ ## This resource supports User Project Overrides.
506
+
507
+ -
508
+
509
+ # IAM policy for Compute Engine BackendBucket
510
+
511
+ Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
512
+
513
+ * `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
514
+ * `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
515
+ * `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
516
+
517
+ A data source can be used to retrieve policy data in advent you do not need creation
518
+
519
+ * `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
520
+
521
+ > **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
522
+
523
+ > **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
524
+
525
+ ## compute.BackendBucketIamPolicy
526
+
527
+ ```python
528
+ import pulumi
529
+ import pulumi_gcp as gcp
530
+
531
+ admin = gcp.organizations.get_iam_policy(bindings=[{
532
+ "role": "roles/viewer",
533
+ "members": ["user:jane@example.com"],
534
+ }])
535
+ policy = gcp.compute.BackendBucketIamPolicy("policy",
536
+ project=image_backend["project"],
537
+ name=image_backend["name"],
538
+ policy_data=admin.policy_data)
539
+ ```
540
+
541
+ ## compute.BackendBucketIamBinding
542
+
543
+ ```python
544
+ import pulumi
545
+ import pulumi_gcp as gcp
546
+
547
+ binding = gcp.compute.BackendBucketIamBinding("binding",
548
+ project=image_backend["project"],
549
+ name=image_backend["name"],
550
+ role="roles/viewer",
551
+ members=["user:jane@example.com"])
552
+ ```
553
+
554
+ ## compute.BackendBucketIamMember
555
+
556
+ ```python
557
+ import pulumi
558
+ import pulumi_gcp as gcp
559
+
560
+ member = gcp.compute.BackendBucketIamMember("member",
561
+ project=image_backend["project"],
562
+ name=image_backend["name"],
563
+ role="roles/viewer",
564
+ member="user:jane@example.com")
565
+ ```
566
+
331
567
  ## Import
332
568
 
333
569
  For all import syntaxes, the "resource in question" can take any of the following forms: