pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -439,6 +439,27 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
|
|
439
439
|
})
|
440
440
|
```
|
441
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Compute Engine Subnetwork
|
447
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
450
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
451
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
456
|
+
|
457
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
461
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
462
|
+
|
442
463
|
## compute.SubnetworkIAMPolicy
|
443
464
|
|
444
465
|
```python
|
@@ -732,6 +753,27 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
|
|
732
753
|
})
|
733
754
|
```
|
734
755
|
|
756
|
+
## This resource supports User Project Overrides.
|
757
|
+
|
758
|
+
-
|
759
|
+
|
760
|
+
# IAM policy for Compute Engine Subnetwork
|
761
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
762
|
+
|
763
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
764
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
765
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
766
|
+
|
767
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
768
|
+
|
769
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
770
|
+
|
771
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
772
|
+
|
773
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
774
|
+
|
775
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
776
|
+
|
735
777
|
## compute.SubnetworkIAMPolicy
|
736
778
|
|
737
779
|
```python
|
@@ -439,6 +439,27 @@ class SubnetworkIAMMember(pulumi.CustomResource):
|
|
439
439
|
})
|
440
440
|
```
|
441
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Compute Engine Subnetwork
|
447
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
450
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
451
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
456
|
+
|
457
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
461
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
462
|
+
|
442
463
|
## compute.SubnetworkIAMPolicy
|
443
464
|
|
444
465
|
```python
|
@@ -732,6 +753,27 @@ class SubnetworkIAMMember(pulumi.CustomResource):
|
|
732
753
|
})
|
733
754
|
```
|
734
755
|
|
756
|
+
## This resource supports User Project Overrides.
|
757
|
+
|
758
|
+
-
|
759
|
+
|
760
|
+
# IAM policy for Compute Engine Subnetwork
|
761
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
762
|
+
|
763
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
764
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
765
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
766
|
+
|
767
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
768
|
+
|
769
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
770
|
+
|
771
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
772
|
+
|
773
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
774
|
+
|
775
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
776
|
+
|
735
777
|
## compute.SubnetworkIAMPolicy
|
736
778
|
|
737
779
|
```python
|
@@ -324,6 +324,27 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
|
|
324
324
|
})
|
325
325
|
```
|
326
326
|
|
327
|
+
## This resource supports User Project Overrides.
|
328
|
+
|
329
|
+
-
|
330
|
+
|
331
|
+
# IAM policy for Compute Engine Subnetwork
|
332
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
333
|
+
|
334
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
335
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
336
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
337
|
+
|
338
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
339
|
+
|
340
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
341
|
+
|
342
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
343
|
+
|
344
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
345
|
+
|
346
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
347
|
+
|
327
348
|
## compute.SubnetworkIAMPolicy
|
328
349
|
|
329
350
|
```python
|
@@ -603,6 +624,27 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
|
|
603
624
|
})
|
604
625
|
```
|
605
626
|
|
627
|
+
## This resource supports User Project Overrides.
|
628
|
+
|
629
|
+
-
|
630
|
+
|
631
|
+
# IAM policy for Compute Engine Subnetwork
|
632
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
633
|
+
|
634
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
635
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
636
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
637
|
+
|
638
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
639
|
+
|
640
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
641
|
+
|
642
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
643
|
+
|
644
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
645
|
+
|
646
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
647
|
+
|
606
648
|
## compute.SubnetworkIAMPolicy
|
607
649
|
|
608
650
|
```python
|
pulumi_gcp/container/_inputs.py
CHANGED
@@ -7856,7 +7856,7 @@ if not MYPY:
|
|
7856
7856
|
"""
|
7857
7857
|
relay_mode: NotRequired[pulumi.Input[str]]
|
7858
7858
|
"""
|
7859
|
-
Mode used to make Relay available.
|
7859
|
+
Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
|
7860
7860
|
"""
|
7861
7861
|
elif False:
|
7862
7862
|
ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -7870,7 +7870,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
|
|
7870
7870
|
"""
|
7871
7871
|
:param pulumi.Input[bool] enable_metrics: Whether or not to enable advanced datapath metrics.
|
7872
7872
|
:param pulumi.Input[bool] enable_relay: Whether or not Relay is enabled.
|
7873
|
-
:param pulumi.Input[str] relay_mode: Mode used to make Relay available.
|
7873
|
+
:param pulumi.Input[str] relay_mode: Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
|
7874
7874
|
"""
|
7875
7875
|
pulumi.set(__self__, "enable_metrics", enable_metrics)
|
7876
7876
|
if enable_relay is not None:
|
@@ -7910,7 +7910,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
|
|
7910
7910
|
@_utilities.deprecated("""Deprecated in favor of enable_relay field. Remove this attribute's configuration as this field will be removed in the next major release and enable_relay will become a required field.""")
|
7911
7911
|
def relay_mode(self) -> Optional[pulumi.Input[str]]:
|
7912
7912
|
"""
|
7913
|
-
Mode used to make Relay available.
|
7913
|
+
Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
|
7914
7914
|
"""
|
7915
7915
|
return pulumi.get(self, "relay_mode")
|
7916
7916
|
|
pulumi_gcp/container/outputs.py
CHANGED
@@ -6476,7 +6476,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
|
|
6476
6476
|
"""
|
6477
6477
|
:param bool enable_metrics: Whether or not to enable advanced datapath metrics.
|
6478
6478
|
:param bool enable_relay: Whether or not Relay is enabled.
|
6479
|
-
:param str relay_mode: Mode used to make Relay available.
|
6479
|
+
:param str relay_mode: Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
|
6480
6480
|
"""
|
6481
6481
|
pulumi.set(__self__, "enable_metrics", enable_metrics)
|
6482
6482
|
if enable_relay is not None:
|
@@ -6505,7 +6505,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
|
|
6505
6505
|
@_utilities.deprecated("""Deprecated in favor of enable_relay field. Remove this attribute's configuration as this field will be removed in the next major release and enable_relay will become a required field.""")
|
6506
6506
|
def relay_mode(self) -> Optional[str]:
|
6507
6507
|
"""
|
6508
|
-
Mode used to make Relay available.
|
6508
|
+
Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
|
6509
6509
|
"""
|
6510
6510
|
return pulumi.get(self, "relay_mode")
|
6511
6511
|
|
@@ -319,6 +319,25 @@ class NoteIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Container Registry Note
|
327
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
330
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
331
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
336
|
+
|
337
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## containeranalysis.NoteIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class NoteIamBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Container Registry Note
|
507
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
510
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
511
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
516
|
+
|
517
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## containeranalysis.NoteIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class NoteIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Container Registry Note
|
327
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
330
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
331
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
336
|
+
|
337
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## containeranalysis.NoteIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class NoteIamMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Container Registry Note
|
507
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
510
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
511
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
516
|
+
|
517
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## containeranalysis.NoteIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class NoteIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Container Registry Note
|
224
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
227
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
228
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
233
|
+
|
234
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## containeranalysis.NoteIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class NoteIamPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Container Registry Note
|
392
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
395
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
396
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
401
|
+
|
402
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## containeranalysis.NoteIamPolicy
|
369
407
|
|
370
408
|
```python
|
@@ -341,6 +341,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog EntryGroup
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
353
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.EntryGroupIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog EntryGroup
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
529
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.EntryGroupIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -341,6 +341,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog EntryGroup
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
353
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.EntryGroupIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog EntryGroup
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
529
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.EntryGroupIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -238,6 +238,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
238
238
|
member="user:jane@example.com")
|
239
239
|
```
|
240
240
|
|
241
|
+
## This resource supports User Project Overrides.
|
242
|
+
|
243
|
+
-
|
244
|
+
|
245
|
+
# IAM policy for Data catalog EntryGroup
|
246
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
247
|
+
|
248
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
249
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
250
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
251
|
+
|
252
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
253
|
+
|
254
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
255
|
+
|
256
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
257
|
+
|
258
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
259
|
+
|
241
260
|
## datacatalog.EntryGroupIamPolicy
|
242
261
|
|
243
262
|
```python
|
@@ -383,6 +402,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
383
402
|
member="user:jane@example.com")
|
384
403
|
```
|
385
404
|
|
405
|
+
## This resource supports User Project Overrides.
|
406
|
+
|
407
|
+
-
|
408
|
+
|
409
|
+
# IAM policy for Data catalog EntryGroup
|
410
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
411
|
+
|
412
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
413
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
414
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
415
|
+
|
416
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
+
|
418
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
419
|
+
|
420
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
421
|
+
|
422
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
+
|
386
424
|
## datacatalog.EntryGroupIamPolicy
|
387
425
|
|
388
426
|
```python
|
@@ -279,6 +279,26 @@ class PolicyTagIamBinding(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Data catalog PolicyTag
|
288
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
291
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
292
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
297
|
+
|
298
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## datacatalog.PolicyTagIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -428,6 +448,26 @@ class PolicyTagIamBinding(pulumi.CustomResource):
|
|
428
448
|
member="user:jane@example.com")
|
429
449
|
```
|
430
450
|
|
451
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
452
|
+
|
453
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
454
|
+
---
|
455
|
+
|
456
|
+
# IAM policy for Data catalog PolicyTag
|
457
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
458
|
+
|
459
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
460
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
461
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
462
|
+
|
463
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
+
|
465
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
466
|
+
|
467
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
468
|
+
|
469
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
+
|
431
471
|
## datacatalog.PolicyTagIamPolicy
|
432
472
|
|
433
473
|
```python
|
@@ -279,6 +279,26 @@ class PolicyTagIamMember(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Data catalog PolicyTag
|
288
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
291
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
292
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
297
|
+
|
298
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## datacatalog.PolicyTagIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -428,6 +448,26 @@ class PolicyTagIamMember(pulumi.CustomResource):
|
|
428
448
|
member="user:jane@example.com")
|
429
449
|
```
|
430
450
|
|
451
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
452
|
+
|
453
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
454
|
+
---
|
455
|
+
|
456
|
+
# IAM policy for Data catalog PolicyTag
|
457
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
458
|
+
|
459
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
460
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
461
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
462
|
+
|
463
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
+
|
465
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
466
|
+
|
467
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
468
|
+
|
469
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
+
|
431
471
|
## datacatalog.PolicyTagIamPolicy
|
432
472
|
|
433
473
|
```python
|