pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -256,6 +256,25 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for Dataproc metastore Federation
|
264
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
267
|
+
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
268
|
+
* `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
|
273
|
+
|
274
|
+
> **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## dataproc.MetastoreFederationIamPolicy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for Dataproc metastore Federation
|
443
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
446
|
+
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
447
|
+
* `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
|
452
|
+
|
453
|
+
> **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## dataproc.MetastoreFederationIamPolicy
|
420
458
|
|
421
459
|
```python
|
@@ -363,6 +363,25 @@ class MetastoreServiceIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Dataproc metastore Service
|
371
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
374
|
+
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
375
|
+
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
380
|
+
|
381
|
+
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## dataproc.MetastoreServiceIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -536,6 +555,25 @@ class MetastoreServiceIamBinding(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Dataproc metastore Service
|
563
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
566
|
+
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
567
|
+
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
572
|
+
|
573
|
+
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## dataproc.MetastoreServiceIamPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -363,6 +363,25 @@ class MetastoreServiceIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Dataproc metastore Service
|
371
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
374
|
+
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
375
|
+
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
380
|
+
|
381
|
+
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## dataproc.MetastoreServiceIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -536,6 +555,25 @@ class MetastoreServiceIamMember(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Dataproc metastore Service
|
563
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
566
|
+
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
567
|
+
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
572
|
+
|
573
|
+
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## dataproc.MetastoreServiceIamPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -260,6 +260,25 @@ class MetastoreServiceIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
+
## This resource supports User Project Overrides.
|
264
|
+
|
265
|
+
-
|
266
|
+
|
267
|
+
# IAM policy for Dataproc metastore Service
|
268
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
271
|
+
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
272
|
+
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
277
|
+
|
278
|
+
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
263
282
|
## dataproc.MetastoreServiceIamPolicy
|
264
283
|
|
265
284
|
```python
|
@@ -421,6 +440,25 @@ class MetastoreServiceIamPolicy(pulumi.CustomResource):
|
|
421
440
|
member="user:jane@example.com")
|
422
441
|
```
|
423
442
|
|
443
|
+
## This resource supports User Project Overrides.
|
444
|
+
|
445
|
+
-
|
446
|
+
|
447
|
+
# IAM policy for Dataproc metastore Service
|
448
|
+
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
449
|
+
|
450
|
+
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
451
|
+
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
452
|
+
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
453
|
+
|
454
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
+
|
456
|
+
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
457
|
+
|
458
|
+
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
459
|
+
|
460
|
+
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
+
|
424
462
|
## dataproc.MetastoreServiceIamPolicy
|
425
463
|
|
426
464
|
```python
|
@@ -319,6 +319,25 @@ class DnsManagedZoneIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud DNS ManagedZone
|
327
|
+
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
330
|
+
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
331
|
+
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
336
|
+
|
337
|
+
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## dns.DnsManagedZoneIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class DnsManagedZoneIamBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud DNS ManagedZone
|
507
|
+
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
510
|
+
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
511
|
+
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
516
|
+
|
517
|
+
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## dns.DnsManagedZoneIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class DnsManagedZoneIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud DNS ManagedZone
|
327
|
+
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
330
|
+
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
331
|
+
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
336
|
+
|
337
|
+
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## dns.DnsManagedZoneIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class DnsManagedZoneIamMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud DNS ManagedZone
|
507
|
+
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
510
|
+
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
511
|
+
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
516
|
+
|
517
|
+
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## dns.DnsManagedZoneIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class DnsManagedZoneIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Cloud DNS ManagedZone
|
224
|
+
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
227
|
+
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
228
|
+
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
233
|
+
|
234
|
+
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## dns.DnsManagedZoneIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class DnsManagedZoneIamPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Cloud DNS ManagedZone
|
392
|
+
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
395
|
+
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
396
|
+
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
401
|
+
|
402
|
+
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## dns.DnsManagedZoneIamPolicy
|
369
407
|
|
370
408
|
```python
|
@@ -271,6 +271,26 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
271
271
|
member="user:jane@example.com")
|
272
272
|
```
|
273
273
|
|
274
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
275
|
+
|
276
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
277
|
+
---
|
278
|
+
|
279
|
+
# IAM policy for Cloud Endpoints Service
|
280
|
+
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
281
|
+
|
282
|
+
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
283
|
+
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
284
|
+
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
285
|
+
|
286
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
287
|
+
|
288
|
+
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
289
|
+
|
290
|
+
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
291
|
+
|
292
|
+
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
293
|
+
|
274
294
|
## endpoints.ServiceIamPolicy
|
275
295
|
|
276
296
|
```python
|
@@ -421,6 +441,26 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
421
441
|
member="user:jane@example.com")
|
422
442
|
```
|
423
443
|
|
444
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
445
|
+
|
446
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
447
|
+
---
|
448
|
+
|
449
|
+
# IAM policy for Cloud Endpoints Service
|
450
|
+
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
451
|
+
|
452
|
+
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
453
|
+
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
454
|
+
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
455
|
+
|
456
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
457
|
+
|
458
|
+
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
459
|
+
|
460
|
+
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
461
|
+
|
462
|
+
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
463
|
+
|
424
464
|
## endpoints.ServiceIamPolicy
|
425
465
|
|
426
466
|
```python
|
@@ -271,6 +271,26 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
271
271
|
member="user:jane@example.com")
|
272
272
|
```
|
273
273
|
|
274
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
275
|
+
|
276
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
277
|
+
---
|
278
|
+
|
279
|
+
# IAM policy for Cloud Endpoints Service
|
280
|
+
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
281
|
+
|
282
|
+
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
283
|
+
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
284
|
+
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
285
|
+
|
286
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
287
|
+
|
288
|
+
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
289
|
+
|
290
|
+
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
291
|
+
|
292
|
+
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
293
|
+
|
274
294
|
## endpoints.ServiceIamPolicy
|
275
295
|
|
276
296
|
```python
|
@@ -421,6 +441,26 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
421
441
|
member="user:jane@example.com")
|
422
442
|
```
|
423
443
|
|
444
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
445
|
+
|
446
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
447
|
+
---
|
448
|
+
|
449
|
+
# IAM policy for Cloud Endpoints Service
|
450
|
+
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
451
|
+
|
452
|
+
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
453
|
+
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
454
|
+
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
455
|
+
|
456
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
457
|
+
|
458
|
+
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
459
|
+
|
460
|
+
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
461
|
+
|
462
|
+
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
463
|
+
|
424
464
|
## endpoints.ServiceIamPolicy
|
425
465
|
|
426
466
|
```python
|
@@ -168,6 +168,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
168
168
|
member="user:jane@example.com")
|
169
169
|
```
|
170
170
|
|
171
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
172
|
+
|
173
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
174
|
+
---
|
175
|
+
|
176
|
+
# IAM policy for Cloud Endpoints Service
|
177
|
+
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
178
|
+
|
179
|
+
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
180
|
+
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
181
|
+
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
182
|
+
|
183
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
184
|
+
|
185
|
+
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
186
|
+
|
187
|
+
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
188
|
+
|
189
|
+
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
190
|
+
|
171
191
|
## endpoints.ServiceIamPolicy
|
172
192
|
|
173
193
|
```python
|
@@ -306,6 +326,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
306
326
|
member="user:jane@example.com")
|
307
327
|
```
|
308
328
|
|
329
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
330
|
+
|
331
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
332
|
+
---
|
333
|
+
|
334
|
+
# IAM policy for Cloud Endpoints Service
|
335
|
+
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
336
|
+
|
337
|
+
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
338
|
+
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
339
|
+
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
340
|
+
|
341
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
342
|
+
|
343
|
+
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
344
|
+
|
345
|
+
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
346
|
+
|
347
|
+
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
348
|
+
|
309
349
|
## endpoints.ServiceIamPolicy
|
310
350
|
|
311
351
|
```python
|
pulumi_gcp/firebase/project.py
CHANGED
@@ -117,7 +117,11 @@ class Project(pulumi.CustomResource):
|
|
117
117
|
|
118
118
|
* [API documentation](https://firebase.google.com/docs/reference/firebase-management/rest/v1beta1/projects)
|
119
119
|
* How-to Guides
|
120
|
-
*
|
120
|
+
* Official Documentation
|
121
|
+
|
122
|
+
> **Note:** This resource should usually be used with a provider configuration
|
123
|
+
with `user_project_override = true` unless you wish for your quota
|
124
|
+
project to be different from the Firebase project.
|
121
125
|
|
122
126
|
## Example Usage
|
123
127
|
|
@@ -176,7 +180,11 @@ class Project(pulumi.CustomResource):
|
|
176
180
|
|
177
181
|
* [API documentation](https://firebase.google.com/docs/reference/firebase-management/rest/v1beta1/projects)
|
178
182
|
* How-to Guides
|
179
|
-
*
|
183
|
+
* Official Documentation
|
184
|
+
|
185
|
+
> **Note:** This resource should usually be used with a provider configuration
|
186
|
+
with `user_project_override = true` unless you wish for your quota
|
187
|
+
project to be different from the Firebase project.
|
180
188
|
|
181
189
|
## Example Usage
|
182
190
|
|
@@ -288,49 +288,6 @@ class IamAuditConfig(pulumi.CustomResource):
|
|
288
288
|
])
|
289
289
|
```
|
290
290
|
|
291
|
-
## folder.IAMPolicy
|
292
|
-
|
293
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
294
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
295
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
296
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
297
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
298
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
299
|
-
applying the change.
|
300
|
-
|
301
|
-
```python
|
302
|
-
import pulumi
|
303
|
-
import pulumi_gcp as gcp
|
304
|
-
|
305
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
306
|
-
"role": "roles/editor",
|
307
|
-
"members": ["user:jane@example.com"],
|
308
|
-
}])
|
309
|
-
folder = gcp.folder.IAMPolicy("folder",
|
310
|
-
folder="folders/1234567",
|
311
|
-
policy_data=admin.policy_data)
|
312
|
-
```
|
313
|
-
|
314
|
-
With IAM Conditions:
|
315
|
-
|
316
|
-
```python
|
317
|
-
import pulumi
|
318
|
-
import pulumi_gcp as gcp
|
319
|
-
|
320
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
321
|
-
"role": "roles/compute.admin",
|
322
|
-
"members": ["user:jane@example.com"],
|
323
|
-
"condition": {
|
324
|
-
"title": "expires_after_2019_12_31",
|
325
|
-
"description": "Expiring at midnight of 2019-12-31",
|
326
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
327
|
-
},
|
328
|
-
}])
|
329
|
-
folder = gcp.folder.IAMPolicy("folder",
|
330
|
-
folder="folders/1234567",
|
331
|
-
policy_data=admin.policy_data)
|
332
|
-
```
|
333
|
-
|
334
291
|
## folder.IAMBinding
|
335
292
|
|
336
293
|
```python
|
@@ -583,49 +540,6 @@ class IamAuditConfig(pulumi.CustomResource):
|
|
583
540
|
])
|
584
541
|
```
|
585
542
|
|
586
|
-
## folder.IAMPolicy
|
587
|
-
|
588
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
589
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
590
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
591
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
592
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
593
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
594
|
-
applying the change.
|
595
|
-
|
596
|
-
```python
|
597
|
-
import pulumi
|
598
|
-
import pulumi_gcp as gcp
|
599
|
-
|
600
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
601
|
-
"role": "roles/editor",
|
602
|
-
"members": ["user:jane@example.com"],
|
603
|
-
}])
|
604
|
-
folder = gcp.folder.IAMPolicy("folder",
|
605
|
-
folder="folders/1234567",
|
606
|
-
policy_data=admin.policy_data)
|
607
|
-
```
|
608
|
-
|
609
|
-
With IAM Conditions:
|
610
|
-
|
611
|
-
```python
|
612
|
-
import pulumi
|
613
|
-
import pulumi_gcp as gcp
|
614
|
-
|
615
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
616
|
-
"role": "roles/compute.admin",
|
617
|
-
"members": ["user:jane@example.com"],
|
618
|
-
"condition": {
|
619
|
-
"title": "expires_after_2019_12_31",
|
620
|
-
"description": "Expiring at midnight of 2019-12-31",
|
621
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
622
|
-
},
|
623
|
-
}])
|
624
|
-
folder = gcp.folder.IAMPolicy("folder",
|
625
|
-
folder="folders/1234567",
|
626
|
-
policy_data=admin.policy_data)
|
627
|
-
```
|
628
|
-
|
629
543
|
## folder.IAMBinding
|
630
544
|
|
631
545
|
```python
|