pulumi-gcp 7.19.0a1712989149__py3-none-any.whl → 7.19.0a1713335069__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +136 -47
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +136 -47
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +90 -84
- pulumi_gcp/apigateway/api_config_iam_binding.py +147 -52
- pulumi_gcp/apigateway/api_config_iam_member.py +147 -52
- pulumi_gcp/apigateway/api_config_iam_policy.py +96 -84
- pulumi_gcp/apigateway/api_iam_binding.py +147 -52
- pulumi_gcp/apigateway/api_iam_member.py +147 -52
- pulumi_gcp/apigateway/api_iam_policy.py +96 -84
- pulumi_gcp/apigateway/gateway_iam_binding.py +153 -52
- pulumi_gcp/apigateway/gateway_iam_member.py +153 -52
- pulumi_gcp/apigateway/gateway_iam_policy.py +102 -84
- pulumi_gcp/apigee/environment_iam_binding.py +139 -44
- pulumi_gcp/apigee/environment_iam_member.py +139 -44
- pulumi_gcp/apigee/environment_iam_policy.py +96 -84
- pulumi_gcp/artifactregistry/repository_iam_binding.py +156 -55
- pulumi_gcp/artifactregistry/repository_iam_member.py +156 -55
- pulumi_gcp/artifactregistry/repository_iam_policy.py +102 -84
- pulumi_gcp/bigquery/connection_iam_binding.py +158 -57
- pulumi_gcp/bigquery/connection_iam_member.py +158 -57
- pulumi_gcp/bigquery/connection_iam_policy.py +102 -84
- pulumi_gcp/bigquery/dataset_iam_binding.py +135 -40
- pulumi_gcp/bigquery/dataset_iam_member.py +135 -40
- pulumi_gcp/bigquery/dataset_iam_policy.py +96 -70
- pulumi_gcp/bigquery/iam_binding.py +283 -54
- pulumi_gcp/bigquery/iam_member.py +283 -54
- pulumi_gcp/bigquery/iam_policy.py +230 -84
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +155 -54
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +155 -54
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +102 -84
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +161 -54
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +161 -54
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +108 -84
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +155 -54
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +155 -54
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +102 -84
- pulumi_gcp/bigtable/instance_iam_binding.py +123 -32
- pulumi_gcp/bigtable/instance_iam_member.py +123 -32
- pulumi_gcp/bigtable/instance_iam_policy.py +92 -63
- pulumi_gcp/bigtable/table_iam_binding.py +160 -63
- pulumi_gcp/bigtable/table_iam_member.py +160 -63
- pulumi_gcp/bigtable/table_iam_policy.py +98 -63
- pulumi_gcp/billing/account_iam_binding.py +120 -31
- pulumi_gcp/billing/account_iam_member.py +120 -31
- pulumi_gcp/billing/account_iam_policy.py +90 -49
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +147 -52
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +147 -52
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +96 -84
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +262 -57
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +262 -57
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +206 -84
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +259 -54
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +259 -54
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +206 -84
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +161 -60
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +161 -60
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +102 -84
- pulumi_gcp/cloudfunctions/function_iam_binding.py +153 -52
- pulumi_gcp/cloudfunctions/function_iam_member.py +153 -52
- pulumi_gcp/cloudfunctions/function_iam_policy.py +102 -84
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +154 -53
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +154 -53
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +102 -84
- pulumi_gcp/cloudrun/iam_binding.py +155 -54
- pulumi_gcp/cloudrun/iam_member.py +155 -54
- pulumi_gcp/cloudrun/iam_policy.py +102 -84
- pulumi_gcp/cloudrunv2/job_iam_binding.py +161 -60
- pulumi_gcp/cloudrunv2/job_iam_member.py +161 -60
- pulumi_gcp/cloudrunv2/job_iam_policy.py +102 -84
- pulumi_gcp/cloudrunv2/service_iam_binding.py +161 -60
- pulumi_gcp/cloudrunv2/service_iam_member.py +161 -60
- pulumi_gcp/cloudrunv2/service_iam_policy.py +102 -84
- pulumi_gcp/cloudtasks/queue_iam_binding.py +161 -60
- pulumi_gcp/cloudtasks/queue_iam_member.py +161 -60
- pulumi_gcp/cloudtasks/queue_iam_policy.py +102 -84
- pulumi_gcp/compute/backend_bucket_iam_binding.py +58 -59
- pulumi_gcp/compute/backend_bucket_iam_member.py +58 -59
- pulumi_gcp/compute/backend_bucket_iam_policy.py +0 -84
- pulumi_gcp/compute/backend_service_iam_binding.py +60 -61
- pulumi_gcp/compute/backend_service_iam_member.py +60 -61
- pulumi_gcp/compute/backend_service_iam_policy.py +0 -84
- pulumi_gcp/compute/disk_iam_binding.py +160 -59
- pulumi_gcp/compute/disk_iam_member.py +160 -59
- pulumi_gcp/compute/disk_iam_policy.py +102 -84
- pulumi_gcp/compute/image_iam_binding.py +271 -54
- pulumi_gcp/compute/image_iam_member.py +271 -54
- pulumi_gcp/compute/image_iam_policy.py +218 -84
- pulumi_gcp/compute/instance_iam_binding.py +283 -54
- pulumi_gcp/compute/instance_iam_member.py +283 -54
- pulumi_gcp/compute/instance_iam_policy.py +230 -84
- pulumi_gcp/compute/machine_image_iam_binding.py +271 -54
- pulumi_gcp/compute/machine_image_iam_member.py +271 -54
- pulumi_gcp/compute/machine_image_iam_policy.py +218 -84
- pulumi_gcp/compute/region_backend_service_iam_binding.py +60 -61
- pulumi_gcp/compute/region_backend_service_iam_member.py +60 -61
- pulumi_gcp/compute/region_backend_service_iam_policy.py +0 -84
- pulumi_gcp/compute/region_disk_iam_binding.py +160 -59
- pulumi_gcp/compute/region_disk_iam_member.py +160 -59
- pulumi_gcp/compute/region_disk_iam_policy.py +102 -84
- pulumi_gcp/compute/snapshot_iam_binding.py +154 -59
- pulumi_gcp/compute/snapshot_iam_member.py +154 -59
- pulumi_gcp/compute/snapshot_iam_policy.py +96 -84
- pulumi_gcp/compute/subnetwork_iam_binding.py +284 -55
- pulumi_gcp/compute/subnetwork_iam_member.py +284 -55
- pulumi_gcp/compute/subnetwork_iam_policy.py +230 -84
- pulumi_gcp/containeranalysis/note_iam_binding.py +154 -59
- pulumi_gcp/containeranalysis/note_iam_member.py +154 -59
- pulumi_gcp/containeranalysis/note_iam_policy.py +96 -84
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +141 -52
- pulumi_gcp/datacatalog/entry_group_iam_member.py +141 -52
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +90 -84
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +133 -44
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +133 -44
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +90 -84
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +142 -53
- pulumi_gcp/datacatalog/tag_template_iam_member.py +142 -53
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +90 -84
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +142 -53
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +142 -53
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +90 -84
- pulumi_gcp/dataplex/asset_iam_binding.py +165 -52
- pulumi_gcp/dataplex/asset_iam_member.py +165 -52
- pulumi_gcp/dataplex/asset_iam_policy.py +114 -84
- pulumi_gcp/dataplex/datascan_iam_binding.py +155 -54
- pulumi_gcp/dataplex/datascan_iam_member.py +155 -54
- pulumi_gcp/dataplex/datascan_iam_policy.py +102 -84
- pulumi_gcp/dataplex/lake_iam_binding.py +153 -52
- pulumi_gcp/dataplex/lake_iam_member.py +153 -52
- pulumi_gcp/dataplex/lake_iam_policy.py +102 -84
- pulumi_gcp/dataplex/task_iam_binding.py +161 -54
- pulumi_gcp/dataplex/task_iam_member.py +161 -54
- pulumi_gcp/dataplex/task_iam_policy.py +108 -84
- pulumi_gcp/dataplex/zone_iam_binding.py +159 -52
- pulumi_gcp/dataplex/zone_iam_member.py +159 -52
- pulumi_gcp/dataplex/zone_iam_policy.py +108 -84
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +173 -72
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +173 -72
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +102 -84
- pulumi_gcp/dataproc/cluster_iam_binding.py +130 -37
- pulumi_gcp/dataproc/cluster_iam_member.py +130 -37
- pulumi_gcp/dataproc/cluster_iam_policy.py +94 -63
- pulumi_gcp/dataproc/job_iam_binding.py +156 -0
- pulumi_gcp/dataproc/job_iam_member.py +156 -0
- pulumi_gcp/dataproc/job_iam_policy.py +94 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +53 -54
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +53 -54
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -84
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +156 -55
- pulumi_gcp/dataproc/metastore_service_iam_member.py +156 -55
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +102 -84
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +147 -52
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +147 -52
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +96 -84
- pulumi_gcp/endpoints/consumers_iam_binding.py +83 -0
- pulumi_gcp/endpoints/consumers_iam_member.py +83 -0
- pulumi_gcp/endpoints/service_iam_binding.py +173 -0
- pulumi_gcp/endpoints/service_iam_member.py +173 -0
- pulumi_gcp/endpoints/service_iam_policy.py +90 -0
- pulumi_gcp/folder/iam_audit_config.py +270 -0
- pulumi_gcp/folder/iam_member.py +318 -0
- pulumi_gcp/folder/iam_policy.py +270 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +162 -61
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +162 -61
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +102 -84
- pulumi_gcp/gkehub/feature_iam_binding.py +161 -60
- pulumi_gcp/gkehub/feature_iam_member.py +161 -60
- pulumi_gcp/gkehub/feature_iam_policy.py +102 -84
- pulumi_gcp/gkehub/membership_iam_binding.py +159 -58
- pulumi_gcp/gkehub/membership_iam_member.py +159 -58
- pulumi_gcp/gkehub/membership_iam_policy.py +102 -84
- pulumi_gcp/gkehub/scope_iam_binding.py +147 -52
- pulumi_gcp/gkehub/scope_iam_member.py +147 -52
- pulumi_gcp/gkehub/scope_iam_policy.py +96 -84
- pulumi_gcp/healthcare/consent_store_iam_binding.py +139 -44
- pulumi_gcp/healthcare/consent_store_iam_member.py +139 -44
- pulumi_gcp/healthcare/consent_store_iam_policy.py +96 -84
- pulumi_gcp/healthcare/dataset_iam_binding.py +126 -37
- pulumi_gcp/healthcare/dataset_iam_member.py +126 -37
- pulumi_gcp/healthcare/dataset_iam_policy.py +90 -63
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +126 -37
- pulumi_gcp/healthcare/dicom_store_iam_member.py +126 -37
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +90 -63
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +121 -32
- pulumi_gcp/healthcare/fhir_store_iam_member.py +121 -32
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +90 -63
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +121 -32
- pulumi_gcp/healthcare/hl7_store_iam_member.py +121 -32
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +90 -63
- pulumi_gcp/iap/app_engine_service_iam_binding.py +284 -55
- pulumi_gcp/iap/app_engine_service_iam_member.py +284 -55
- pulumi_gcp/iap/app_engine_service_iam_policy.py +230 -84
- pulumi_gcp/iap/app_engine_version_iam_binding.py +297 -56
- pulumi_gcp/iap/app_engine_version_iam_member.py +297 -56
- pulumi_gcp/iap/app_engine_version_iam_policy.py +242 -84
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +283 -54
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +283 -54
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +230 -84
- pulumi_gcp/iap/tunnel_iam_binding.py +259 -54
- pulumi_gcp/iap/tunnel_iam_member.py +259 -54
- pulumi_gcp/iap/tunnel_iam_policy.py +206 -84
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +283 -54
- pulumi_gcp/iap/tunnel_instance_iam_member.py +283 -54
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +230 -84
- pulumi_gcp/iap/web_backend_service_iam_binding.py +272 -55
- pulumi_gcp/iap/web_backend_service_iam_member.py +272 -55
- pulumi_gcp/iap/web_backend_service_iam_policy.py +218 -84
- pulumi_gcp/iap/web_iam_binding.py +259 -54
- pulumi_gcp/iap/web_iam_member.py +259 -54
- pulumi_gcp/iap/web_iam_policy.py +206 -84
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +284 -55
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +284 -55
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +230 -84
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +271 -54
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +271 -54
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +218 -84
- pulumi_gcp/iap/web_type_compute_iam_binding.py +259 -54
- pulumi_gcp/iap/web_type_compute_iam_member.py +259 -54
- pulumi_gcp/iap/web_type_compute_iam_policy.py +206 -84
- pulumi_gcp/kms/crypto_key_iam_binding.py +36 -37
- pulumi_gcp/kms/crypto_key_iam_member.py +36 -37
- pulumi_gcp/kms/crypto_key_iam_policy.py +0 -63
- pulumi_gcp/kms/key_ring_iam_binding.py +253 -32
- pulumi_gcp/kms/key_ring_iam_member.py +253 -32
- pulumi_gcp/kms/key_ring_iam_policy.py +222 -63
- pulumi_gcp/networksecurity/address_group_iam_policy.py +0 -84
- pulumi_gcp/notebooks/instance_iam_binding.py +154 -53
- pulumi_gcp/notebooks/instance_iam_member.py +154 -53
- pulumi_gcp/notebooks/instance_iam_policy.py +102 -84
- pulumi_gcp/notebooks/runtime_iam_binding.py +155 -54
- pulumi_gcp/notebooks/runtime_iam_member.py +155 -54
- pulumi_gcp/notebooks/runtime_iam_policy.py +102 -84
- pulumi_gcp/organizations/iam_member.py +330 -0
- pulumi_gcp/organizations/iam_policy.py +282 -0
- pulumi_gcp/projects/iam_audit_config.py +270 -0
- pulumi_gcp/projects/iam_binding.py +318 -0
- pulumi_gcp/projects/iam_member.py +318 -0
- pulumi_gcp/projects/iam_policy.py +270 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +148 -53
- pulumi_gcp/pubsub/schema_iam_member.py +148 -53
- pulumi_gcp/pubsub/schema_iam_policy.py +96 -84
- pulumi_gcp/pubsub/subscription_iam_binding.py +146 -57
- pulumi_gcp/pubsub/subscription_iam_member.py +146 -57
- pulumi_gcp/pubsub/subscription_iam_policy.py +90 -63
- pulumi_gcp/pubsub/topic_iam_binding.py +148 -53
- pulumi_gcp/pubsub/topic_iam_member.py +148 -53
- pulumi_gcp/pubsub/topic_iam_policy.py +96 -84
- pulumi_gcp/runtimeconfig/config_iam_binding.py +51 -52
- pulumi_gcp/runtimeconfig/config_iam_member.py +51 -52
- pulumi_gcp/runtimeconfig/config_iam_policy.py +0 -84
- pulumi_gcp/secretmanager/secret_iam_binding.py +147 -52
- pulumi_gcp/secretmanager/secret_iam_member.py +147 -52
- pulumi_gcp/secretmanager/secret_iam_policy.py +96 -84
- pulumi_gcp/serviceaccount/iam_binding.py +262 -51
- pulumi_gcp/serviceaccount/iam_member.py +262 -51
- pulumi_gcp/serviceaccount/iam_policy.py +212 -63
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +136 -47
- pulumi_gcp/servicedirectory/namespace_iam_member.py +136 -47
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +90 -84
- pulumi_gcp/servicedirectory/service_iam_binding.py +136 -47
- pulumi_gcp/servicedirectory/service_iam_member.py +136 -47
- pulumi_gcp/servicedirectory/service_iam_policy.py +90 -84
- pulumi_gcp/sourcerepo/repository_iam_binding.py +147 -52
- pulumi_gcp/sourcerepo/repository_iam_member.py +147 -52
- pulumi_gcp/sourcerepo/repository_iam_policy.py +96 -84
- pulumi_gcp/spanner/database_iam_binding.py +253 -32
- pulumi_gcp/spanner/database_iam_member.py +253 -32
- pulumi_gcp/spanner/database_iam_policy.py +222 -63
- pulumi_gcp/spanner/instance_iam_binding.py +121 -32
- pulumi_gcp/spanner/instance_iam_member.py +121 -32
- pulumi_gcp/spanner/instance_iam_policy.py +90 -63
- pulumi_gcp/storage/bucket_iam_binding.py +255 -50
- pulumi_gcp/storage/bucket_iam_member.py +255 -50
- pulumi_gcp/storage/bucket_iam_policy.py +206 -84
- pulumi_gcp/tags/tag_key_iam_binding.py +149 -60
- pulumi_gcp/tags/tag_key_iam_member.py +149 -60
- pulumi_gcp/tags/tag_key_iam_policy.py +90 -84
- pulumi_gcp/tags/tag_value_iam_binding.py +149 -60
- pulumi_gcp/tags/tag_value_iam_member.py +149 -60
- pulumi_gcp/tags/tag_value_iam_policy.py +90 -84
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +33 -34
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +33 -34
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +0 -84
- pulumi_gcp/vertex/ai_feature_store_iam_binding.py +51 -52
- pulumi_gcp/vertex/ai_feature_store_iam_member.py +51 -52
- pulumi_gcp/vertex/ai_feature_store_iam_policy.py +0 -84
- pulumi_gcp/workstations/workstation_config_iam_binding.py +53 -54
- pulumi_gcp/workstations/workstation_config_iam_member.py +53 -54
- pulumi_gcp/workstations/workstation_config_iam_policy.py +0 -84
- pulumi_gcp/workstations/workstation_iam_binding.py +53 -54
- pulumi_gcp/workstations/workstation_iam_member.py +53 -54
- pulumi_gcp/workstations/workstation_iam_policy.py +0 -84
- {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/RECORD +295 -295
- {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/top_level.txt +0 -0
@@ -22,6 +22,12 @@ class IAMMemberArgs:
|
|
22
22
|
condition: Optional[pulumi.Input['IAMMemberConditionArgs']] = None):
|
23
23
|
"""
|
24
24
|
The set of arguments for constructing a IAMMember resource.
|
25
|
+
:param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
|
26
|
+
Each entry can have one of the following values:
|
27
|
+
* **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
|
28
|
+
* **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
|
29
|
+
* **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
|
30
|
+
* **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
|
25
31
|
:param pulumi.Input[str] org_id: The organization id of the target organization.
|
26
32
|
:param pulumi.Input[str] role: The role that should be applied. Only one
|
27
33
|
`organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
|
@@ -38,6 +44,14 @@ class IAMMemberArgs:
|
|
38
44
|
@property
|
39
45
|
@pulumi.getter
|
40
46
|
def member(self) -> pulumi.Input[str]:
|
47
|
+
"""
|
48
|
+
Identities that will be granted the privilege in `role`.
|
49
|
+
Each entry can have one of the following values:
|
50
|
+
* **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
|
51
|
+
* **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
|
52
|
+
* **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
|
53
|
+
* **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
|
54
|
+
"""
|
41
55
|
return pulumi.get(self, "member")
|
42
56
|
|
43
57
|
@member.setter
|
@@ -97,6 +111,12 @@ class _IAMMemberState:
|
|
97
111
|
:param pulumi.Input['IAMMemberConditionArgs'] condition: An [IAM Condition](https://cloud.google.com/iam/docs/conditions-overview) for a given binding.
|
98
112
|
Structure is documented below.
|
99
113
|
:param pulumi.Input[str] etag: (Computed) The etag of the organization's IAM policy.
|
114
|
+
:param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
|
115
|
+
Each entry can have one of the following values:
|
116
|
+
* **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
|
117
|
+
* **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
|
118
|
+
* **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
|
119
|
+
* **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
|
100
120
|
:param pulumi.Input[str] org_id: The organization id of the target organization.
|
101
121
|
:param pulumi.Input[str] role: The role that should be applied. Only one
|
102
122
|
`organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
|
@@ -141,6 +161,14 @@ class _IAMMemberState:
|
|
141
161
|
@property
|
142
162
|
@pulumi.getter
|
143
163
|
def member(self) -> Optional[pulumi.Input[str]]:
|
164
|
+
"""
|
165
|
+
Identities that will be granted the privilege in `role`.
|
166
|
+
Each entry can have one of the following values:
|
167
|
+
* **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
|
168
|
+
* **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
|
169
|
+
* **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
|
170
|
+
* **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
|
171
|
+
"""
|
144
172
|
return pulumi.get(self, "member")
|
145
173
|
|
146
174
|
@member.setter
|
@@ -337,6 +365,147 @@ class IAMMember(pulumi.CustomResource):
|
|
337
365
|
```
|
338
366
|
<!--End PulumiCodeChooser -->
|
339
367
|
|
368
|
+
## google\\_organization\\_iam\\_policy
|
369
|
+
|
370
|
+
!> **Warning:** New organizations have several default policies which will,
|
371
|
+
without extreme caution, be **overwritten** by use of this resource.
|
372
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
373
|
+
resources. This resource makes it easy to remove your own access to
|
374
|
+
an organization, which will require a call to Google Support to have
|
375
|
+
fixed, and can take multiple days to resolve.
|
376
|
+
|
377
|
+
In general, this resource should only be used with organizations
|
378
|
+
fully managed by this provider.I f you do use this resource,
|
379
|
+
the best way to be sure that you are not making dangerous changes is to start
|
380
|
+
by **importing** your existing policy, and examining the diff very closely.
|
381
|
+
|
382
|
+
<!--Start PulumiCodeChooser -->
|
383
|
+
```python
|
384
|
+
import pulumi
|
385
|
+
import pulumi_gcp as gcp
|
386
|
+
|
387
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
388
|
+
role="roles/editor",
|
389
|
+
members=["user:jane@example.com"],
|
390
|
+
)])
|
391
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
392
|
+
org_id="1234567890",
|
393
|
+
policy_data=admin.policy_data)
|
394
|
+
```
|
395
|
+
<!--End PulumiCodeChooser -->
|
396
|
+
|
397
|
+
With IAM Conditions:
|
398
|
+
|
399
|
+
<!--Start PulumiCodeChooser -->
|
400
|
+
```python
|
401
|
+
import pulumi
|
402
|
+
import pulumi_gcp as gcp
|
403
|
+
|
404
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
405
|
+
role="roles/editor",
|
406
|
+
members=["user:jane@example.com"],
|
407
|
+
condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
|
408
|
+
title="expires_after_2019_12_31",
|
409
|
+
description="Expiring at midnight of 2019-12-31",
|
410
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
411
|
+
),
|
412
|
+
)])
|
413
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
414
|
+
org_id="1234567890",
|
415
|
+
policy_data=admin.policy_data)
|
416
|
+
```
|
417
|
+
<!--End PulumiCodeChooser -->
|
418
|
+
|
419
|
+
## google\\_organization\\_iam\\_binding
|
420
|
+
|
421
|
+
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
422
|
+
|
423
|
+
<!--Start PulumiCodeChooser -->
|
424
|
+
```python
|
425
|
+
import pulumi
|
426
|
+
import pulumi_gcp as gcp
|
427
|
+
|
428
|
+
organization = gcp.organizations.IAMBinding("organization",
|
429
|
+
org_id="1234567890",
|
430
|
+
role="roles/editor",
|
431
|
+
members=["user:jane@example.com"])
|
432
|
+
```
|
433
|
+
<!--End PulumiCodeChooser -->
|
434
|
+
|
435
|
+
With IAM Conditions:
|
436
|
+
|
437
|
+
<!--Start PulumiCodeChooser -->
|
438
|
+
```python
|
439
|
+
import pulumi
|
440
|
+
import pulumi_gcp as gcp
|
441
|
+
|
442
|
+
organization = gcp.organizations.IAMBinding("organization",
|
443
|
+
org_id="1234567890",
|
444
|
+
role="roles/editor",
|
445
|
+
members=["user:jane@example.com"],
|
446
|
+
condition=gcp.organizations.IAMBindingConditionArgs(
|
447
|
+
title="expires_after_2019_12_31",
|
448
|
+
description="Expiring at midnight of 2019-12-31",
|
449
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
450
|
+
))
|
451
|
+
```
|
452
|
+
<!--End PulumiCodeChooser -->
|
453
|
+
|
454
|
+
## google\\_organization\\_iam\\_member
|
455
|
+
|
456
|
+
<!--Start PulumiCodeChooser -->
|
457
|
+
```python
|
458
|
+
import pulumi
|
459
|
+
import pulumi_gcp as gcp
|
460
|
+
|
461
|
+
organization = gcp.organizations.IAMMember("organization",
|
462
|
+
org_id="1234567890",
|
463
|
+
role="roles/editor",
|
464
|
+
member="user:jane@example.com")
|
465
|
+
```
|
466
|
+
<!--End PulumiCodeChooser -->
|
467
|
+
|
468
|
+
With IAM Conditions:
|
469
|
+
|
470
|
+
<!--Start PulumiCodeChooser -->
|
471
|
+
```python
|
472
|
+
import pulumi
|
473
|
+
import pulumi_gcp as gcp
|
474
|
+
|
475
|
+
organization = gcp.organizations.IAMMember("organization",
|
476
|
+
org_id="1234567890",
|
477
|
+
role="roles/editor",
|
478
|
+
member="user:jane@example.com",
|
479
|
+
condition=gcp.organizations.IAMMemberConditionArgs(
|
480
|
+
title="expires_after_2019_12_31",
|
481
|
+
description="Expiring at midnight of 2019-12-31",
|
482
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
483
|
+
))
|
484
|
+
```
|
485
|
+
<!--End PulumiCodeChooser -->
|
486
|
+
|
487
|
+
## google\\_organization\\_iam\\_audit\\_config
|
488
|
+
|
489
|
+
<!--Start PulumiCodeChooser -->
|
490
|
+
```python
|
491
|
+
import pulumi
|
492
|
+
import pulumi_gcp as gcp
|
493
|
+
|
494
|
+
organization = gcp.organizations.IamAuditConfig("organization",
|
495
|
+
org_id="1234567890",
|
496
|
+
service="allServices",
|
497
|
+
audit_log_configs=[
|
498
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
499
|
+
log_type="ADMIN_READ",
|
500
|
+
),
|
501
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
502
|
+
log_type="DATA_READ",
|
503
|
+
exempted_members=["user:joebloggs@example.com"],
|
504
|
+
),
|
505
|
+
])
|
506
|
+
```
|
507
|
+
<!--End PulumiCodeChooser -->
|
508
|
+
|
340
509
|
## Import
|
341
510
|
|
342
511
|
### Importing Audit Configs
|
@@ -367,6 +536,12 @@ class IAMMember(pulumi.CustomResource):
|
|
367
536
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
368
537
|
:param pulumi.Input[pulumi.InputType['IAMMemberConditionArgs']] condition: An [IAM Condition](https://cloud.google.com/iam/docs/conditions-overview) for a given binding.
|
369
538
|
Structure is documented below.
|
539
|
+
:param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
|
540
|
+
Each entry can have one of the following values:
|
541
|
+
* **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
|
542
|
+
* **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
|
543
|
+
* **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
|
544
|
+
* **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
|
370
545
|
:param pulumi.Input[str] org_id: The organization id of the target organization.
|
371
546
|
:param pulumi.Input[str] role: The role that should be applied. Only one
|
372
547
|
`organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
|
@@ -531,6 +706,147 @@ class IAMMember(pulumi.CustomResource):
|
|
531
706
|
```
|
532
707
|
<!--End PulumiCodeChooser -->
|
533
708
|
|
709
|
+
## google\\_organization\\_iam\\_policy
|
710
|
+
|
711
|
+
!> **Warning:** New organizations have several default policies which will,
|
712
|
+
without extreme caution, be **overwritten** by use of this resource.
|
713
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
714
|
+
resources. This resource makes it easy to remove your own access to
|
715
|
+
an organization, which will require a call to Google Support to have
|
716
|
+
fixed, and can take multiple days to resolve.
|
717
|
+
|
718
|
+
In general, this resource should only be used with organizations
|
719
|
+
fully managed by this provider.I f you do use this resource,
|
720
|
+
the best way to be sure that you are not making dangerous changes is to start
|
721
|
+
by **importing** your existing policy, and examining the diff very closely.
|
722
|
+
|
723
|
+
<!--Start PulumiCodeChooser -->
|
724
|
+
```python
|
725
|
+
import pulumi
|
726
|
+
import pulumi_gcp as gcp
|
727
|
+
|
728
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
729
|
+
role="roles/editor",
|
730
|
+
members=["user:jane@example.com"],
|
731
|
+
)])
|
732
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
733
|
+
org_id="1234567890",
|
734
|
+
policy_data=admin.policy_data)
|
735
|
+
```
|
736
|
+
<!--End PulumiCodeChooser -->
|
737
|
+
|
738
|
+
With IAM Conditions:
|
739
|
+
|
740
|
+
<!--Start PulumiCodeChooser -->
|
741
|
+
```python
|
742
|
+
import pulumi
|
743
|
+
import pulumi_gcp as gcp
|
744
|
+
|
745
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
746
|
+
role="roles/editor",
|
747
|
+
members=["user:jane@example.com"],
|
748
|
+
condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
|
749
|
+
title="expires_after_2019_12_31",
|
750
|
+
description="Expiring at midnight of 2019-12-31",
|
751
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
752
|
+
),
|
753
|
+
)])
|
754
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
755
|
+
org_id="1234567890",
|
756
|
+
policy_data=admin.policy_data)
|
757
|
+
```
|
758
|
+
<!--End PulumiCodeChooser -->
|
759
|
+
|
760
|
+
## google\\_organization\\_iam\\_binding
|
761
|
+
|
762
|
+
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
763
|
+
|
764
|
+
<!--Start PulumiCodeChooser -->
|
765
|
+
```python
|
766
|
+
import pulumi
|
767
|
+
import pulumi_gcp as gcp
|
768
|
+
|
769
|
+
organization = gcp.organizations.IAMBinding("organization",
|
770
|
+
org_id="1234567890",
|
771
|
+
role="roles/editor",
|
772
|
+
members=["user:jane@example.com"])
|
773
|
+
```
|
774
|
+
<!--End PulumiCodeChooser -->
|
775
|
+
|
776
|
+
With IAM Conditions:
|
777
|
+
|
778
|
+
<!--Start PulumiCodeChooser -->
|
779
|
+
```python
|
780
|
+
import pulumi
|
781
|
+
import pulumi_gcp as gcp
|
782
|
+
|
783
|
+
organization = gcp.organizations.IAMBinding("organization",
|
784
|
+
org_id="1234567890",
|
785
|
+
role="roles/editor",
|
786
|
+
members=["user:jane@example.com"],
|
787
|
+
condition=gcp.organizations.IAMBindingConditionArgs(
|
788
|
+
title="expires_after_2019_12_31",
|
789
|
+
description="Expiring at midnight of 2019-12-31",
|
790
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
791
|
+
))
|
792
|
+
```
|
793
|
+
<!--End PulumiCodeChooser -->
|
794
|
+
|
795
|
+
## google\\_organization\\_iam\\_member
|
796
|
+
|
797
|
+
<!--Start PulumiCodeChooser -->
|
798
|
+
```python
|
799
|
+
import pulumi
|
800
|
+
import pulumi_gcp as gcp
|
801
|
+
|
802
|
+
organization = gcp.organizations.IAMMember("organization",
|
803
|
+
org_id="1234567890",
|
804
|
+
role="roles/editor",
|
805
|
+
member="user:jane@example.com")
|
806
|
+
```
|
807
|
+
<!--End PulumiCodeChooser -->
|
808
|
+
|
809
|
+
With IAM Conditions:
|
810
|
+
|
811
|
+
<!--Start PulumiCodeChooser -->
|
812
|
+
```python
|
813
|
+
import pulumi
|
814
|
+
import pulumi_gcp as gcp
|
815
|
+
|
816
|
+
organization = gcp.organizations.IAMMember("organization",
|
817
|
+
org_id="1234567890",
|
818
|
+
role="roles/editor",
|
819
|
+
member="user:jane@example.com",
|
820
|
+
condition=gcp.organizations.IAMMemberConditionArgs(
|
821
|
+
title="expires_after_2019_12_31",
|
822
|
+
description="Expiring at midnight of 2019-12-31",
|
823
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
824
|
+
))
|
825
|
+
```
|
826
|
+
<!--End PulumiCodeChooser -->
|
827
|
+
|
828
|
+
## google\\_organization\\_iam\\_audit\\_config
|
829
|
+
|
830
|
+
<!--Start PulumiCodeChooser -->
|
831
|
+
```python
|
832
|
+
import pulumi
|
833
|
+
import pulumi_gcp as gcp
|
834
|
+
|
835
|
+
organization = gcp.organizations.IamAuditConfig("organization",
|
836
|
+
org_id="1234567890",
|
837
|
+
service="allServices",
|
838
|
+
audit_log_configs=[
|
839
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
840
|
+
log_type="ADMIN_READ",
|
841
|
+
),
|
842
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
843
|
+
log_type="DATA_READ",
|
844
|
+
exempted_members=["user:joebloggs@example.com"],
|
845
|
+
),
|
846
|
+
])
|
847
|
+
```
|
848
|
+
<!--End PulumiCodeChooser -->
|
849
|
+
|
534
850
|
## Import
|
535
851
|
|
536
852
|
### Importing Audit Configs
|
@@ -621,6 +937,12 @@ class IAMMember(pulumi.CustomResource):
|
|
621
937
|
:param pulumi.Input[pulumi.InputType['IAMMemberConditionArgs']] condition: An [IAM Condition](https://cloud.google.com/iam/docs/conditions-overview) for a given binding.
|
622
938
|
Structure is documented below.
|
623
939
|
:param pulumi.Input[str] etag: (Computed) The etag of the organization's IAM policy.
|
940
|
+
:param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
|
941
|
+
Each entry can have one of the following values:
|
942
|
+
* **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
|
943
|
+
* **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
|
944
|
+
* **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
|
945
|
+
* **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
|
624
946
|
:param pulumi.Input[str] org_id: The organization id of the target organization.
|
625
947
|
:param pulumi.Input[str] role: The role that should be applied. Only one
|
626
948
|
`organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
|
@@ -657,6 +979,14 @@ class IAMMember(pulumi.CustomResource):
|
|
657
979
|
@property
|
658
980
|
@pulumi.getter
|
659
981
|
def member(self) -> pulumi.Output[str]:
|
982
|
+
"""
|
983
|
+
Identities that will be granted the privilege in `role`.
|
984
|
+
Each entry can have one of the following values:
|
985
|
+
* **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
|
986
|
+
* **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
|
987
|
+
* **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
|
988
|
+
* **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
|
989
|
+
"""
|
660
990
|
return pulumi.get(self, "member")
|
661
991
|
|
662
992
|
@property
|
@@ -294,6 +294,147 @@ class IAMPolicy(pulumi.CustomResource):
|
|
294
294
|
```
|
295
295
|
<!--End PulumiCodeChooser -->
|
296
296
|
|
297
|
+
## google\\_organization\\_iam\\_policy
|
298
|
+
|
299
|
+
!> **Warning:** New organizations have several default policies which will,
|
300
|
+
without extreme caution, be **overwritten** by use of this resource.
|
301
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
302
|
+
resources. This resource makes it easy to remove your own access to
|
303
|
+
an organization, which will require a call to Google Support to have
|
304
|
+
fixed, and can take multiple days to resolve.
|
305
|
+
|
306
|
+
In general, this resource should only be used with organizations
|
307
|
+
fully managed by this provider.I f you do use this resource,
|
308
|
+
the best way to be sure that you are not making dangerous changes is to start
|
309
|
+
by **importing** your existing policy, and examining the diff very closely.
|
310
|
+
|
311
|
+
<!--Start PulumiCodeChooser -->
|
312
|
+
```python
|
313
|
+
import pulumi
|
314
|
+
import pulumi_gcp as gcp
|
315
|
+
|
316
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
317
|
+
role="roles/editor",
|
318
|
+
members=["user:jane@example.com"],
|
319
|
+
)])
|
320
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
321
|
+
org_id="1234567890",
|
322
|
+
policy_data=admin.policy_data)
|
323
|
+
```
|
324
|
+
<!--End PulumiCodeChooser -->
|
325
|
+
|
326
|
+
With IAM Conditions:
|
327
|
+
|
328
|
+
<!--Start PulumiCodeChooser -->
|
329
|
+
```python
|
330
|
+
import pulumi
|
331
|
+
import pulumi_gcp as gcp
|
332
|
+
|
333
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
334
|
+
role="roles/editor",
|
335
|
+
members=["user:jane@example.com"],
|
336
|
+
condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
|
337
|
+
title="expires_after_2019_12_31",
|
338
|
+
description="Expiring at midnight of 2019-12-31",
|
339
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
340
|
+
),
|
341
|
+
)])
|
342
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
343
|
+
org_id="1234567890",
|
344
|
+
policy_data=admin.policy_data)
|
345
|
+
```
|
346
|
+
<!--End PulumiCodeChooser -->
|
347
|
+
|
348
|
+
## google\\_organization\\_iam\\_binding
|
349
|
+
|
350
|
+
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
351
|
+
|
352
|
+
<!--Start PulumiCodeChooser -->
|
353
|
+
```python
|
354
|
+
import pulumi
|
355
|
+
import pulumi_gcp as gcp
|
356
|
+
|
357
|
+
organization = gcp.organizations.IAMBinding("organization",
|
358
|
+
org_id="1234567890",
|
359
|
+
role="roles/editor",
|
360
|
+
members=["user:jane@example.com"])
|
361
|
+
```
|
362
|
+
<!--End PulumiCodeChooser -->
|
363
|
+
|
364
|
+
With IAM Conditions:
|
365
|
+
|
366
|
+
<!--Start PulumiCodeChooser -->
|
367
|
+
```python
|
368
|
+
import pulumi
|
369
|
+
import pulumi_gcp as gcp
|
370
|
+
|
371
|
+
organization = gcp.organizations.IAMBinding("organization",
|
372
|
+
org_id="1234567890",
|
373
|
+
role="roles/editor",
|
374
|
+
members=["user:jane@example.com"],
|
375
|
+
condition=gcp.organizations.IAMBindingConditionArgs(
|
376
|
+
title="expires_after_2019_12_31",
|
377
|
+
description="Expiring at midnight of 2019-12-31",
|
378
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
379
|
+
))
|
380
|
+
```
|
381
|
+
<!--End PulumiCodeChooser -->
|
382
|
+
|
383
|
+
## google\\_organization\\_iam\\_member
|
384
|
+
|
385
|
+
<!--Start PulumiCodeChooser -->
|
386
|
+
```python
|
387
|
+
import pulumi
|
388
|
+
import pulumi_gcp as gcp
|
389
|
+
|
390
|
+
organization = gcp.organizations.IAMMember("organization",
|
391
|
+
org_id="1234567890",
|
392
|
+
role="roles/editor",
|
393
|
+
member="user:jane@example.com")
|
394
|
+
```
|
395
|
+
<!--End PulumiCodeChooser -->
|
396
|
+
|
397
|
+
With IAM Conditions:
|
398
|
+
|
399
|
+
<!--Start PulumiCodeChooser -->
|
400
|
+
```python
|
401
|
+
import pulumi
|
402
|
+
import pulumi_gcp as gcp
|
403
|
+
|
404
|
+
organization = gcp.organizations.IAMMember("organization",
|
405
|
+
org_id="1234567890",
|
406
|
+
role="roles/editor",
|
407
|
+
member="user:jane@example.com",
|
408
|
+
condition=gcp.organizations.IAMMemberConditionArgs(
|
409
|
+
title="expires_after_2019_12_31",
|
410
|
+
description="Expiring at midnight of 2019-12-31",
|
411
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
412
|
+
))
|
413
|
+
```
|
414
|
+
<!--End PulumiCodeChooser -->
|
415
|
+
|
416
|
+
## google\\_organization\\_iam\\_audit\\_config
|
417
|
+
|
418
|
+
<!--Start PulumiCodeChooser -->
|
419
|
+
```python
|
420
|
+
import pulumi
|
421
|
+
import pulumi_gcp as gcp
|
422
|
+
|
423
|
+
organization = gcp.organizations.IamAuditConfig("organization",
|
424
|
+
org_id="1234567890",
|
425
|
+
service="allServices",
|
426
|
+
audit_log_configs=[
|
427
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
428
|
+
log_type="ADMIN_READ",
|
429
|
+
),
|
430
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
431
|
+
log_type="DATA_READ",
|
432
|
+
exempted_members=["user:joebloggs@example.com"],
|
433
|
+
),
|
434
|
+
])
|
435
|
+
```
|
436
|
+
<!--End PulumiCodeChooser -->
|
437
|
+
|
297
438
|
## Import
|
298
439
|
|
299
440
|
### Importing Audit Configs
|
@@ -491,6 +632,147 @@ class IAMPolicy(pulumi.CustomResource):
|
|
491
632
|
```
|
492
633
|
<!--End PulumiCodeChooser -->
|
493
634
|
|
635
|
+
## google\\_organization\\_iam\\_policy
|
636
|
+
|
637
|
+
!> **Warning:** New organizations have several default policies which will,
|
638
|
+
without extreme caution, be **overwritten** by use of this resource.
|
639
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
640
|
+
resources. This resource makes it easy to remove your own access to
|
641
|
+
an organization, which will require a call to Google Support to have
|
642
|
+
fixed, and can take multiple days to resolve.
|
643
|
+
|
644
|
+
In general, this resource should only be used with organizations
|
645
|
+
fully managed by this provider.I f you do use this resource,
|
646
|
+
the best way to be sure that you are not making dangerous changes is to start
|
647
|
+
by **importing** your existing policy, and examining the diff very closely.
|
648
|
+
|
649
|
+
<!--Start PulumiCodeChooser -->
|
650
|
+
```python
|
651
|
+
import pulumi
|
652
|
+
import pulumi_gcp as gcp
|
653
|
+
|
654
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
655
|
+
role="roles/editor",
|
656
|
+
members=["user:jane@example.com"],
|
657
|
+
)])
|
658
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
659
|
+
org_id="1234567890",
|
660
|
+
policy_data=admin.policy_data)
|
661
|
+
```
|
662
|
+
<!--End PulumiCodeChooser -->
|
663
|
+
|
664
|
+
With IAM Conditions:
|
665
|
+
|
666
|
+
<!--Start PulumiCodeChooser -->
|
667
|
+
```python
|
668
|
+
import pulumi
|
669
|
+
import pulumi_gcp as gcp
|
670
|
+
|
671
|
+
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
672
|
+
role="roles/editor",
|
673
|
+
members=["user:jane@example.com"],
|
674
|
+
condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
|
675
|
+
title="expires_after_2019_12_31",
|
676
|
+
description="Expiring at midnight of 2019-12-31",
|
677
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
678
|
+
),
|
679
|
+
)])
|
680
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
681
|
+
org_id="1234567890",
|
682
|
+
policy_data=admin.policy_data)
|
683
|
+
```
|
684
|
+
<!--End PulumiCodeChooser -->
|
685
|
+
|
686
|
+
## google\\_organization\\_iam\\_binding
|
687
|
+
|
688
|
+
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
689
|
+
|
690
|
+
<!--Start PulumiCodeChooser -->
|
691
|
+
```python
|
692
|
+
import pulumi
|
693
|
+
import pulumi_gcp as gcp
|
694
|
+
|
695
|
+
organization = gcp.organizations.IAMBinding("organization",
|
696
|
+
org_id="1234567890",
|
697
|
+
role="roles/editor",
|
698
|
+
members=["user:jane@example.com"])
|
699
|
+
```
|
700
|
+
<!--End PulumiCodeChooser -->
|
701
|
+
|
702
|
+
With IAM Conditions:
|
703
|
+
|
704
|
+
<!--Start PulumiCodeChooser -->
|
705
|
+
```python
|
706
|
+
import pulumi
|
707
|
+
import pulumi_gcp as gcp
|
708
|
+
|
709
|
+
organization = gcp.organizations.IAMBinding("organization",
|
710
|
+
org_id="1234567890",
|
711
|
+
role="roles/editor",
|
712
|
+
members=["user:jane@example.com"],
|
713
|
+
condition=gcp.organizations.IAMBindingConditionArgs(
|
714
|
+
title="expires_after_2019_12_31",
|
715
|
+
description="Expiring at midnight of 2019-12-31",
|
716
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
717
|
+
))
|
718
|
+
```
|
719
|
+
<!--End PulumiCodeChooser -->
|
720
|
+
|
721
|
+
## google\\_organization\\_iam\\_member
|
722
|
+
|
723
|
+
<!--Start PulumiCodeChooser -->
|
724
|
+
```python
|
725
|
+
import pulumi
|
726
|
+
import pulumi_gcp as gcp
|
727
|
+
|
728
|
+
organization = gcp.organizations.IAMMember("organization",
|
729
|
+
org_id="1234567890",
|
730
|
+
role="roles/editor",
|
731
|
+
member="user:jane@example.com")
|
732
|
+
```
|
733
|
+
<!--End PulumiCodeChooser -->
|
734
|
+
|
735
|
+
With IAM Conditions:
|
736
|
+
|
737
|
+
<!--Start PulumiCodeChooser -->
|
738
|
+
```python
|
739
|
+
import pulumi
|
740
|
+
import pulumi_gcp as gcp
|
741
|
+
|
742
|
+
organization = gcp.organizations.IAMMember("organization",
|
743
|
+
org_id="1234567890",
|
744
|
+
role="roles/editor",
|
745
|
+
member="user:jane@example.com",
|
746
|
+
condition=gcp.organizations.IAMMemberConditionArgs(
|
747
|
+
title="expires_after_2019_12_31",
|
748
|
+
description="Expiring at midnight of 2019-12-31",
|
749
|
+
expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
750
|
+
))
|
751
|
+
```
|
752
|
+
<!--End PulumiCodeChooser -->
|
753
|
+
|
754
|
+
## google\\_organization\\_iam\\_audit\\_config
|
755
|
+
|
756
|
+
<!--Start PulumiCodeChooser -->
|
757
|
+
```python
|
758
|
+
import pulumi
|
759
|
+
import pulumi_gcp as gcp
|
760
|
+
|
761
|
+
organization = gcp.organizations.IamAuditConfig("organization",
|
762
|
+
org_id="1234567890",
|
763
|
+
service="allServices",
|
764
|
+
audit_log_configs=[
|
765
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
766
|
+
log_type="ADMIN_READ",
|
767
|
+
),
|
768
|
+
gcp.organizations.IamAuditConfigAuditLogConfigArgs(
|
769
|
+
log_type="DATA_READ",
|
770
|
+
exempted_members=["user:joebloggs@example.com"],
|
771
|
+
),
|
772
|
+
])
|
773
|
+
```
|
774
|
+
<!--End PulumiCodeChooser -->
|
775
|
+
|
494
776
|
## Import
|
495
777
|
|
496
778
|
### Importing Audit Configs
|