pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -2686,7 +2686,10 @@ if not MYPY:
|
|
2686
2686
|
"""
|
2687
2687
|
A Google Cloud resource that is allowed to ingress the perimeter.
|
2688
2688
|
Requests from these resources will be allowed to access perimeter data.
|
2689
|
-
Currently only projects are allowed.
|
2689
|
+
Currently only projects and VPCs are allowed.
|
2690
|
+
Project format: `projects/{projectNumber}`
|
2691
|
+
VPC network format:
|
2692
|
+
`//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
|
2690
2693
|
The project may be in any Google Cloud organization, not just the
|
2691
2694
|
organization that the perimeter is defined in. `*` is not allowed, the case
|
2692
2695
|
of allowing all Google Cloud resources only is not supported.
|
@@ -2710,7 +2713,10 @@ class ServicePerimeterIngressPolicyIngressFromSourceArgs:
|
|
2710
2713
|
If * is specified, then all IngressSources will be allowed.
|
2711
2714
|
:param pulumi.Input[str] resource: A Google Cloud resource that is allowed to ingress the perimeter.
|
2712
2715
|
Requests from these resources will be allowed to access perimeter data.
|
2713
|
-
Currently only projects are allowed.
|
2716
|
+
Currently only projects and VPCs are allowed.
|
2717
|
+
Project format: `projects/{projectNumber}`
|
2718
|
+
VPC network format:
|
2719
|
+
`//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
|
2714
2720
|
The project may be in any Google Cloud organization, not just the
|
2715
2721
|
organization that the perimeter is defined in. `*` is not allowed, the case
|
2716
2722
|
of allowing all Google Cloud resources only is not supported.
|
@@ -2745,7 +2751,10 @@ class ServicePerimeterIngressPolicyIngressFromSourceArgs:
|
|
2745
2751
|
"""
|
2746
2752
|
A Google Cloud resource that is allowed to ingress the perimeter.
|
2747
2753
|
Requests from these resources will be allowed to access perimeter data.
|
2748
|
-
Currently only projects are allowed.
|
2754
|
+
Currently only projects and VPCs are allowed.
|
2755
|
+
Project format: `projects/{projectNumber}`
|
2756
|
+
VPC network format:
|
2757
|
+
`//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
|
2749
2758
|
The project may be in any Google Cloud organization, not just the
|
2750
2759
|
organization that the perimeter is defined in. `*` is not allowed, the case
|
2751
2760
|
of allowing all Google Cloud resources only is not supported.
|
@@ -25,13 +25,13 @@ class AccessPolicyArgs:
|
|
25
25
|
"""
|
26
26
|
The set of arguments for constructing a AccessPolicy resource.
|
27
27
|
:param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
|
28
|
-
Format: organizations/{organization_id}
|
28
|
+
Format: 'organizations/{{organization_id}}'
|
29
29
|
:param pulumi.Input[str] title: Human readable title. Does not affect behavior.
|
30
30
|
|
31
31
|
|
32
32
|
- - -
|
33
33
|
:param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
|
34
|
-
Format: folders/{{folder_id}} or projects/{{
|
34
|
+
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
|
35
35
|
"""
|
36
36
|
pulumi.set(__self__, "parent", parent)
|
37
37
|
pulumi.set(__self__, "title", title)
|
@@ -43,7 +43,7 @@ class AccessPolicyArgs:
|
|
43
43
|
def parent(self) -> pulumi.Input[str]:
|
44
44
|
"""
|
45
45
|
The parent of this AccessPolicy in the Cloud Resource Hierarchy.
|
46
|
-
Format: organizations/{organization_id}
|
46
|
+
Format: 'organizations/{{organization_id}}'
|
47
47
|
"""
|
48
48
|
return pulumi.get(self, "parent")
|
49
49
|
|
@@ -71,7 +71,7 @@ class AccessPolicyArgs:
|
|
71
71
|
def scopes(self) -> Optional[pulumi.Input[str]]:
|
72
72
|
"""
|
73
73
|
Folder or project on which this policy is applicable.
|
74
|
-
Format: folders/{{folder_id}} or projects/{{
|
74
|
+
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
|
75
75
|
"""
|
76
76
|
return pulumi.get(self, "scopes")
|
77
77
|
|
@@ -92,11 +92,11 @@ class _AccessPolicyState:
|
|
92
92
|
"""
|
93
93
|
Input properties used for looking up and filtering AccessPolicy resources.
|
94
94
|
:param pulumi.Input[str] create_time: Time the AccessPolicy was created in UTC.
|
95
|
-
:param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: {policy_id}
|
95
|
+
:param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: '{{policy_id}}'
|
96
96
|
:param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
|
97
|
-
Format: organizations/{organization_id}
|
97
|
+
Format: 'organizations/{{organization_id}}'
|
98
98
|
:param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
|
99
|
-
Format: folders/{{folder_id}} or projects/{{
|
99
|
+
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
|
100
100
|
:param pulumi.Input[str] title: Human readable title. Does not affect behavior.
|
101
101
|
|
102
102
|
|
@@ -132,7 +132,7 @@ class _AccessPolicyState:
|
|
132
132
|
@pulumi.getter
|
133
133
|
def name(self) -> Optional[pulumi.Input[str]]:
|
134
134
|
"""
|
135
|
-
Resource name of the AccessPolicy. Format: {policy_id}
|
135
|
+
Resource name of the AccessPolicy. Format: '{{policy_id}}'
|
136
136
|
"""
|
137
137
|
return pulumi.get(self, "name")
|
138
138
|
|
@@ -145,7 +145,7 @@ class _AccessPolicyState:
|
|
145
145
|
def parent(self) -> Optional[pulumi.Input[str]]:
|
146
146
|
"""
|
147
147
|
The parent of this AccessPolicy in the Cloud Resource Hierarchy.
|
148
|
-
Format: organizations/{organization_id}
|
148
|
+
Format: 'organizations/{{organization_id}}'
|
149
149
|
"""
|
150
150
|
return pulumi.get(self, "parent")
|
151
151
|
|
@@ -158,7 +158,7 @@ class _AccessPolicyState:
|
|
158
158
|
def scopes(self) -> Optional[pulumi.Input[str]]:
|
159
159
|
"""
|
160
160
|
Folder or project on which this policy is applicable.
|
161
|
-
Format: folders/{{folder_id}} or projects/{{
|
161
|
+
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
|
162
162
|
"""
|
163
163
|
return pulumi.get(self, "scopes")
|
164
164
|
|
@@ -265,9 +265,9 @@ class AccessPolicy(pulumi.CustomResource):
|
|
265
265
|
:param str resource_name: The name of the resource.
|
266
266
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
267
267
|
:param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
|
268
|
-
Format: organizations/{organization_id}
|
268
|
+
Format: 'organizations/{{organization_id}}'
|
269
269
|
:param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
|
270
|
-
Format: folders/{{folder_id}} or projects/{{
|
270
|
+
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
|
271
271
|
:param pulumi.Input[str] title: Human readable title. Does not affect behavior.
|
272
272
|
|
273
273
|
|
@@ -399,11 +399,11 @@ class AccessPolicy(pulumi.CustomResource):
|
|
399
399
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
400
400
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
401
401
|
:param pulumi.Input[str] create_time: Time the AccessPolicy was created in UTC.
|
402
|
-
:param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: {policy_id}
|
402
|
+
:param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: '{{policy_id}}'
|
403
403
|
:param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
|
404
|
-
Format: organizations/{organization_id}
|
404
|
+
Format: 'organizations/{{organization_id}}'
|
405
405
|
:param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
|
406
|
-
Format: folders/{{folder_id}} or projects/{{
|
406
|
+
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
|
407
407
|
:param pulumi.Input[str] title: Human readable title. Does not affect behavior.
|
408
408
|
|
409
409
|
|
@@ -434,7 +434,7 @@ class AccessPolicy(pulumi.CustomResource):
|
|
434
434
|
@pulumi.getter
|
435
435
|
def name(self) -> pulumi.Output[str]:
|
436
436
|
"""
|
437
|
-
Resource name of the AccessPolicy. Format: {policy_id}
|
437
|
+
Resource name of the AccessPolicy. Format: '{{policy_id}}'
|
438
438
|
"""
|
439
439
|
return pulumi.get(self, "name")
|
440
440
|
|
@@ -443,7 +443,7 @@ class AccessPolicy(pulumi.CustomResource):
|
|
443
443
|
def parent(self) -> pulumi.Output[str]:
|
444
444
|
"""
|
445
445
|
The parent of this AccessPolicy in the Cloud Resource Hierarchy.
|
446
|
-
Format: organizations/{organization_id}
|
446
|
+
Format: 'organizations/{{organization_id}}'
|
447
447
|
"""
|
448
448
|
return pulumi.get(self, "parent")
|
449
449
|
|
@@ -452,7 +452,7 @@ class AccessPolicy(pulumi.CustomResource):
|
|
452
452
|
def scopes(self) -> pulumi.Output[Optional[str]]:
|
453
453
|
"""
|
454
454
|
Folder or project on which this policy is applicable.
|
455
|
-
Format: folders/{{folder_id}} or projects/{{
|
455
|
+
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
|
456
456
|
"""
|
457
457
|
return pulumi.get(self, "scopes")
|
458
458
|
|
@@ -280,6 +280,26 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
289
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
292
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
293
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
298
|
+
|
299
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## accesscontextmanager.AccessPolicyIamPolicy
|
284
304
|
|
285
305
|
```python
|
@@ -431,6 +451,26 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
|
|
431
451
|
member="user:jane@example.com")
|
432
452
|
```
|
433
453
|
|
454
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
455
|
+
|
456
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
457
|
+
---
|
458
|
+
|
459
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
460
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
461
|
+
|
462
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
463
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
464
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
465
|
+
|
466
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
467
|
+
|
468
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
469
|
+
|
470
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
471
|
+
|
472
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
473
|
+
|
434
474
|
## accesscontextmanager.AccessPolicyIamPolicy
|
435
475
|
|
436
476
|
```python
|
@@ -280,6 +280,26 @@ class AccessPolicyIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
289
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
292
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
293
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
298
|
+
|
299
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## accesscontextmanager.AccessPolicyIamPolicy
|
284
304
|
|
285
305
|
```python
|
@@ -431,6 +451,26 @@ class AccessPolicyIamMember(pulumi.CustomResource):
|
|
431
451
|
member="user:jane@example.com")
|
432
452
|
```
|
433
453
|
|
454
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
455
|
+
|
456
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
457
|
+
---
|
458
|
+
|
459
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
460
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
461
|
+
|
462
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
463
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
464
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
465
|
+
|
466
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
467
|
+
|
468
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
469
|
+
|
470
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
471
|
+
|
472
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
473
|
+
|
434
474
|
## accesscontextmanager.AccessPolicyIamPolicy
|
435
475
|
|
436
476
|
```python
|
@@ -177,6 +177,26 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
+
|
182
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
+
---
|
184
|
+
|
185
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
186
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
187
|
+
|
188
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
189
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
190
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
191
|
+
|
192
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
+
|
194
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
195
|
+
|
196
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
197
|
+
|
198
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
+
|
180
200
|
## accesscontextmanager.AccessPolicyIamPolicy
|
181
201
|
|
182
202
|
```python
|
@@ -316,6 +336,26 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
|
|
316
336
|
member="user:jane@example.com")
|
317
337
|
```
|
318
338
|
|
339
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
340
|
+
|
341
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
342
|
+
---
|
343
|
+
|
344
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
345
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
346
|
+
|
347
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
348
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
349
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
350
|
+
|
351
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
352
|
+
|
353
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
354
|
+
|
355
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
356
|
+
|
357
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
358
|
+
|
319
359
|
## accesscontextmanager.AccessPolicyIamPolicy
|
320
360
|
|
321
361
|
```python
|
@@ -2049,7 +2049,10 @@ class ServicePerimeterIngressPolicyIngressFromSource(dict):
|
|
2049
2049
|
If * is specified, then all IngressSources will be allowed.
|
2050
2050
|
:param str resource: A Google Cloud resource that is allowed to ingress the perimeter.
|
2051
2051
|
Requests from these resources will be allowed to access perimeter data.
|
2052
|
-
Currently only projects are allowed.
|
2052
|
+
Currently only projects and VPCs are allowed.
|
2053
|
+
Project format: `projects/{projectNumber}`
|
2054
|
+
VPC network format:
|
2055
|
+
`//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
|
2053
2056
|
The project may be in any Google Cloud organization, not just the
|
2054
2057
|
organization that the perimeter is defined in. `*` is not allowed, the case
|
2055
2058
|
of allowing all Google Cloud resources only is not supported.
|
@@ -2080,7 +2083,10 @@ class ServicePerimeterIngressPolicyIngressFromSource(dict):
|
|
2080
2083
|
"""
|
2081
2084
|
A Google Cloud resource that is allowed to ingress the perimeter.
|
2082
2085
|
Requests from these resources will be allowed to access perimeter data.
|
2083
|
-
Currently only projects are allowed.
|
2086
|
+
Currently only projects and VPCs are allowed.
|
2087
|
+
Project format: `projects/{projectNumber}`
|
2088
|
+
VPC network format:
|
2089
|
+
`//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
|
2084
2090
|
The project may be in any Google Cloud organization, not just the
|
2085
2091
|
organization that the perimeter is defined in. `*` is not allowed, the case
|
2086
2092
|
of allowing all Google Cloud resources only is not supported.
|
@@ -347,6 +347,25 @@ class ApiConfigIamBinding(pulumi.CustomResource):
|
|
347
347
|
member="user:jane@example.com")
|
348
348
|
```
|
349
349
|
|
350
|
+
## This resource supports User Project Overrides.
|
351
|
+
|
352
|
+
-
|
353
|
+
|
354
|
+
# IAM policy for API Gateway ApiConfig
|
355
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
356
|
+
|
357
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
358
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
359
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
360
|
+
|
361
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
362
|
+
|
363
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
364
|
+
|
365
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
366
|
+
|
367
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
368
|
+
|
350
369
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
351
370
|
|
352
371
|
```python
|
@@ -511,6 +530,25 @@ class ApiConfigIamBinding(pulumi.CustomResource):
|
|
511
530
|
member="user:jane@example.com")
|
512
531
|
```
|
513
532
|
|
533
|
+
## This resource supports User Project Overrides.
|
534
|
+
|
535
|
+
-
|
536
|
+
|
537
|
+
# IAM policy for API Gateway ApiConfig
|
538
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
539
|
+
|
540
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
541
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
542
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
543
|
+
|
544
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
545
|
+
|
546
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
547
|
+
|
548
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
549
|
+
|
550
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
551
|
+
|
514
552
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
515
553
|
|
516
554
|
```python
|
@@ -347,6 +347,25 @@ class ApiConfigIamMember(pulumi.CustomResource):
|
|
347
347
|
member="user:jane@example.com")
|
348
348
|
```
|
349
349
|
|
350
|
+
## This resource supports User Project Overrides.
|
351
|
+
|
352
|
+
-
|
353
|
+
|
354
|
+
# IAM policy for API Gateway ApiConfig
|
355
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
356
|
+
|
357
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
358
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
359
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
360
|
+
|
361
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
362
|
+
|
363
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
364
|
+
|
365
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
366
|
+
|
367
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
368
|
+
|
350
369
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
351
370
|
|
352
371
|
```python
|
@@ -511,6 +530,25 @@ class ApiConfigIamMember(pulumi.CustomResource):
|
|
511
530
|
member="user:jane@example.com")
|
512
531
|
```
|
513
532
|
|
533
|
+
## This resource supports User Project Overrides.
|
534
|
+
|
535
|
+
-
|
536
|
+
|
537
|
+
# IAM policy for API Gateway ApiConfig
|
538
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
539
|
+
|
540
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
541
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
542
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
543
|
+
|
544
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
545
|
+
|
546
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
547
|
+
|
548
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
549
|
+
|
550
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
551
|
+
|
514
552
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
515
553
|
|
516
554
|
```python
|
@@ -244,6 +244,25 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
|
|
244
244
|
member="user:jane@example.com")
|
245
245
|
```
|
246
246
|
|
247
|
+
## This resource supports User Project Overrides.
|
248
|
+
|
249
|
+
-
|
250
|
+
|
251
|
+
# IAM policy for API Gateway ApiConfig
|
252
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
253
|
+
|
254
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
255
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
256
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
257
|
+
|
258
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
259
|
+
|
260
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
261
|
+
|
262
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
263
|
+
|
264
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
265
|
+
|
247
266
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
248
267
|
|
249
268
|
```python
|
@@ -396,6 +415,25 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
|
|
396
415
|
member="user:jane@example.com")
|
397
416
|
```
|
398
417
|
|
418
|
+
## This resource supports User Project Overrides.
|
419
|
+
|
420
|
+
-
|
421
|
+
|
422
|
+
# IAM policy for API Gateway ApiConfig
|
423
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
424
|
+
|
425
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
426
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
427
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
428
|
+
|
429
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
430
|
+
|
431
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
432
|
+
|
433
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
434
|
+
|
435
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
436
|
+
|
399
437
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
400
438
|
|
401
439
|
```python
|
@@ -311,6 +311,25 @@ class ApiIamBinding(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
+
## This resource supports User Project Overrides.
|
315
|
+
|
316
|
+
-
|
317
|
+
|
318
|
+
# IAM policy for API Gateway Api
|
319
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
320
|
+
|
321
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
322
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
323
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
324
|
+
|
325
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
+
|
327
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
328
|
+
|
329
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
330
|
+
|
331
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
+
|
314
333
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
315
334
|
|
316
335
|
```python
|
@@ -471,6 +490,25 @@ class ApiIamBinding(pulumi.CustomResource):
|
|
471
490
|
member="user:jane@example.com")
|
472
491
|
```
|
473
492
|
|
493
|
+
## This resource supports User Project Overrides.
|
494
|
+
|
495
|
+
-
|
496
|
+
|
497
|
+
# IAM policy for API Gateway Api
|
498
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
499
|
+
|
500
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
501
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
502
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
503
|
+
|
504
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
+
|
506
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
507
|
+
|
508
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
509
|
+
|
510
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
+
|
474
512
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
475
513
|
|
476
514
|
```python
|
@@ -311,6 +311,25 @@ class ApiIamMember(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
+
## This resource supports User Project Overrides.
|
315
|
+
|
316
|
+
-
|
317
|
+
|
318
|
+
# IAM policy for API Gateway Api
|
319
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
320
|
+
|
321
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
322
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
323
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
324
|
+
|
325
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
+
|
327
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
328
|
+
|
329
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
330
|
+
|
331
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
+
|
314
333
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
315
334
|
|
316
335
|
```python
|
@@ -471,6 +490,25 @@ class ApiIamMember(pulumi.CustomResource):
|
|
471
490
|
member="user:jane@example.com")
|
472
491
|
```
|
473
492
|
|
493
|
+
## This resource supports User Project Overrides.
|
494
|
+
|
495
|
+
-
|
496
|
+
|
497
|
+
# IAM policy for API Gateway Api
|
498
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
499
|
+
|
500
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
501
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
502
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
503
|
+
|
504
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
+
|
506
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
507
|
+
|
508
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
509
|
+
|
510
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
+
|
474
512
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
475
513
|
|
476
514
|
```python
|