pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -208,6 +208,25 @@ class ApiIamPolicy(pulumi.CustomResource):
|
|
208
208
|
member="user:jane@example.com")
|
209
209
|
```
|
210
210
|
|
211
|
+
## This resource supports User Project Overrides.
|
212
|
+
|
213
|
+
-
|
214
|
+
|
215
|
+
# IAM policy for API Gateway Api
|
216
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
217
|
+
|
218
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
219
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
220
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
221
|
+
|
222
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
223
|
+
|
224
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
225
|
+
|
226
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
227
|
+
|
228
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
229
|
+
|
211
230
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
212
231
|
|
213
232
|
```python
|
@@ -356,6 +375,25 @@ class ApiIamPolicy(pulumi.CustomResource):
|
|
356
375
|
member="user:jane@example.com")
|
357
376
|
```
|
358
377
|
|
378
|
+
## This resource supports User Project Overrides.
|
379
|
+
|
380
|
+
-
|
381
|
+
|
382
|
+
# IAM policy for API Gateway Api
|
383
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
384
|
+
|
385
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
386
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
387
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
388
|
+
|
389
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
390
|
+
|
391
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
392
|
+
|
393
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
394
|
+
|
395
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
396
|
+
|
359
397
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
360
398
|
|
361
399
|
```python
|
@@ -359,6 +359,25 @@ class GatewayIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for API Gateway Gateway
|
367
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
370
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
371
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
376
|
+
|
377
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class GatewayIamBinding(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for API Gateway Gateway
|
558
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
561
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
562
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
567
|
+
|
568
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
535
573
|
|
536
574
|
```python
|
@@ -359,6 +359,25 @@ class GatewayIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for API Gateway Gateway
|
367
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
370
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
371
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
376
|
+
|
377
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class GatewayIamMember(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for API Gateway Gateway
|
558
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
561
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
562
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
567
|
+
|
568
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
535
573
|
|
536
574
|
```python
|
@@ -256,6 +256,25 @@ class GatewayIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for API Gateway Gateway
|
264
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
267
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
268
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
273
|
+
|
274
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class GatewayIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for API Gateway Gateway
|
443
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
446
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
447
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
452
|
+
|
453
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
420
458
|
|
421
459
|
```python
|
@@ -306,6 +306,26 @@ class EnvironmentIamBinding(pulumi.CustomResource):
|
|
306
306
|
member="user:jane@example.com")
|
307
307
|
```
|
308
308
|
|
309
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
310
|
+
|
311
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
312
|
+
---
|
313
|
+
|
314
|
+
# IAM policy for Apigee Environment
|
315
|
+
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
316
|
+
|
317
|
+
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
318
|
+
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
319
|
+
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
320
|
+
|
321
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
322
|
+
|
323
|
+
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
324
|
+
|
325
|
+
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
326
|
+
|
327
|
+
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
328
|
+
|
309
329
|
## apigee.EnvironmentIamPolicy
|
310
330
|
|
311
331
|
```python
|
@@ -463,6 +483,26 @@ class EnvironmentIamBinding(pulumi.CustomResource):
|
|
463
483
|
member="user:jane@example.com")
|
464
484
|
```
|
465
485
|
|
486
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
487
|
+
|
488
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
489
|
+
---
|
490
|
+
|
491
|
+
# IAM policy for Apigee Environment
|
492
|
+
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
493
|
+
|
494
|
+
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
495
|
+
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
496
|
+
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
497
|
+
|
498
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
499
|
+
|
500
|
+
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
501
|
+
|
502
|
+
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
503
|
+
|
504
|
+
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
505
|
+
|
466
506
|
## apigee.EnvironmentIamPolicy
|
467
507
|
|
468
508
|
```python
|
@@ -306,6 +306,26 @@ class EnvironmentIamMember(pulumi.CustomResource):
|
|
306
306
|
member="user:jane@example.com")
|
307
307
|
```
|
308
308
|
|
309
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
310
|
+
|
311
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
312
|
+
---
|
313
|
+
|
314
|
+
# IAM policy for Apigee Environment
|
315
|
+
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
316
|
+
|
317
|
+
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
318
|
+
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
319
|
+
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
320
|
+
|
321
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
322
|
+
|
323
|
+
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
324
|
+
|
325
|
+
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
326
|
+
|
327
|
+
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
328
|
+
|
309
329
|
## apigee.EnvironmentIamPolicy
|
310
330
|
|
311
331
|
```python
|
@@ -463,6 +483,26 @@ class EnvironmentIamMember(pulumi.CustomResource):
|
|
463
483
|
member="user:jane@example.com")
|
464
484
|
```
|
465
485
|
|
486
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
487
|
+
|
488
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
489
|
+
---
|
490
|
+
|
491
|
+
# IAM policy for Apigee Environment
|
492
|
+
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
493
|
+
|
494
|
+
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
495
|
+
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
496
|
+
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
497
|
+
|
498
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
499
|
+
|
500
|
+
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
501
|
+
|
502
|
+
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
503
|
+
|
504
|
+
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
505
|
+
|
466
506
|
## apigee.EnvironmentIamPolicy
|
467
507
|
|
468
508
|
```python
|
@@ -203,6 +203,26 @@ class EnvironmentIamPolicy(pulumi.CustomResource):
|
|
203
203
|
member="user:jane@example.com")
|
204
204
|
```
|
205
205
|
|
206
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
207
|
+
|
208
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
209
|
+
---
|
210
|
+
|
211
|
+
# IAM policy for Apigee Environment
|
212
|
+
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
213
|
+
|
214
|
+
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
215
|
+
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
216
|
+
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
217
|
+
|
218
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
219
|
+
|
220
|
+
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
221
|
+
|
222
|
+
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
223
|
+
|
224
|
+
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
225
|
+
|
206
226
|
## apigee.EnvironmentIamPolicy
|
207
227
|
|
208
228
|
```python
|
@@ -348,6 +368,26 @@ class EnvironmentIamPolicy(pulumi.CustomResource):
|
|
348
368
|
member="user:jane@example.com")
|
349
369
|
```
|
350
370
|
|
371
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
372
|
+
|
373
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
374
|
+
---
|
375
|
+
|
376
|
+
# IAM policy for Apigee Environment
|
377
|
+
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
378
|
+
|
379
|
+
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
380
|
+
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
381
|
+
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
382
|
+
|
383
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
384
|
+
|
385
|
+
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
386
|
+
|
387
|
+
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
388
|
+
|
389
|
+
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
390
|
+
|
351
391
|
## apigee.EnvironmentIamPolicy
|
352
392
|
|
353
393
|
```python
|
@@ -367,6 +367,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
+
## This resource supports User Project Overrides.
|
371
|
+
|
372
|
+
-
|
373
|
+
|
374
|
+
# IAM policy for Artifact Registry Repository
|
375
|
+
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
376
|
+
|
377
|
+
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
378
|
+
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
379
|
+
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
380
|
+
|
381
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
+
|
383
|
+
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
384
|
+
|
385
|
+
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
386
|
+
|
387
|
+
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
+
|
370
389
|
## artifactregistry.RepositoryIamPolicy
|
371
390
|
|
372
391
|
```python
|
@@ -540,6 +559,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
540
559
|
member="user:jane@example.com")
|
541
560
|
```
|
542
561
|
|
562
|
+
## This resource supports User Project Overrides.
|
563
|
+
|
564
|
+
-
|
565
|
+
|
566
|
+
# IAM policy for Artifact Registry Repository
|
567
|
+
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
568
|
+
|
569
|
+
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
570
|
+
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
571
|
+
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
572
|
+
|
573
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
+
|
575
|
+
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
576
|
+
|
577
|
+
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
578
|
+
|
579
|
+
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
+
|
543
581
|
## artifactregistry.RepositoryIamPolicy
|
544
582
|
|
545
583
|
```python
|
@@ -367,6 +367,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
+
## This resource supports User Project Overrides.
|
371
|
+
|
372
|
+
-
|
373
|
+
|
374
|
+
# IAM policy for Artifact Registry Repository
|
375
|
+
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
376
|
+
|
377
|
+
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
378
|
+
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
379
|
+
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
380
|
+
|
381
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
+
|
383
|
+
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
384
|
+
|
385
|
+
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
386
|
+
|
387
|
+
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
+
|
370
389
|
## artifactregistry.RepositoryIamPolicy
|
371
390
|
|
372
391
|
```python
|
@@ -540,6 +559,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
540
559
|
member="user:jane@example.com")
|
541
560
|
```
|
542
561
|
|
562
|
+
## This resource supports User Project Overrides.
|
563
|
+
|
564
|
+
-
|
565
|
+
|
566
|
+
# IAM policy for Artifact Registry Repository
|
567
|
+
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
568
|
+
|
569
|
+
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
570
|
+
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
571
|
+
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
572
|
+
|
573
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
+
|
575
|
+
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
576
|
+
|
577
|
+
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
578
|
+
|
579
|
+
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
+
|
543
581
|
## artifactregistry.RepositoryIamPolicy
|
544
582
|
|
545
583
|
```python
|
@@ -264,6 +264,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
264
264
|
member="user:jane@example.com")
|
265
265
|
```
|
266
266
|
|
267
|
+
## This resource supports User Project Overrides.
|
268
|
+
|
269
|
+
-
|
270
|
+
|
271
|
+
# IAM policy for Artifact Registry Repository
|
272
|
+
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
273
|
+
|
274
|
+
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
275
|
+
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
276
|
+
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
277
|
+
|
278
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
279
|
+
|
280
|
+
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
281
|
+
|
282
|
+
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
283
|
+
|
284
|
+
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
285
|
+
|
267
286
|
## artifactregistry.RepositoryIamPolicy
|
268
287
|
|
269
288
|
```python
|
@@ -425,6 +444,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
425
444
|
member="user:jane@example.com")
|
426
445
|
```
|
427
446
|
|
447
|
+
## This resource supports User Project Overrides.
|
448
|
+
|
449
|
+
-
|
450
|
+
|
451
|
+
# IAM policy for Artifact Registry Repository
|
452
|
+
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
453
|
+
|
454
|
+
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
455
|
+
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
456
|
+
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
457
|
+
|
458
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
459
|
+
|
460
|
+
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
461
|
+
|
462
|
+
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
463
|
+
|
464
|
+
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
465
|
+
|
428
466
|
## artifactregistry.RepositoryIamPolicy
|
429
467
|
|
430
468
|
```python
|
@@ -391,6 +391,25 @@ class ConnectionIamBinding(pulumi.CustomResource):
|
|
391
391
|
member="user:jane@example.com")
|
392
392
|
```
|
393
393
|
|
394
|
+
## This resource supports User Project Overrides.
|
395
|
+
|
396
|
+
-
|
397
|
+
|
398
|
+
# IAM policy for BigQuery Connection Connection
|
399
|
+
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
400
|
+
|
401
|
+
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
402
|
+
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
403
|
+
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
404
|
+
|
405
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
406
|
+
|
407
|
+
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
408
|
+
|
409
|
+
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
410
|
+
|
411
|
+
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
412
|
+
|
394
413
|
## bigquery.ConnectionIamPolicy
|
395
414
|
|
396
415
|
```python
|
@@ -570,6 +589,25 @@ class ConnectionIamBinding(pulumi.CustomResource):
|
|
570
589
|
member="user:jane@example.com")
|
571
590
|
```
|
572
591
|
|
592
|
+
## This resource supports User Project Overrides.
|
593
|
+
|
594
|
+
-
|
595
|
+
|
596
|
+
# IAM policy for BigQuery Connection Connection
|
597
|
+
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
598
|
+
|
599
|
+
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
600
|
+
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
601
|
+
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
602
|
+
|
603
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
604
|
+
|
605
|
+
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
606
|
+
|
607
|
+
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
608
|
+
|
609
|
+
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
610
|
+
|
573
611
|
## bigquery.ConnectionIamPolicy
|
574
612
|
|
575
613
|
```python
|
@@ -391,6 +391,25 @@ class ConnectionIamMember(pulumi.CustomResource):
|
|
391
391
|
member="user:jane@example.com")
|
392
392
|
```
|
393
393
|
|
394
|
+
## This resource supports User Project Overrides.
|
395
|
+
|
396
|
+
-
|
397
|
+
|
398
|
+
# IAM policy for BigQuery Connection Connection
|
399
|
+
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
400
|
+
|
401
|
+
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
402
|
+
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
403
|
+
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
404
|
+
|
405
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
406
|
+
|
407
|
+
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
408
|
+
|
409
|
+
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
410
|
+
|
411
|
+
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
412
|
+
|
394
413
|
## bigquery.ConnectionIamPolicy
|
395
414
|
|
396
415
|
```python
|
@@ -570,6 +589,25 @@ class ConnectionIamMember(pulumi.CustomResource):
|
|
570
589
|
member="user:jane@example.com")
|
571
590
|
```
|
572
591
|
|
592
|
+
## This resource supports User Project Overrides.
|
593
|
+
|
594
|
+
-
|
595
|
+
|
596
|
+
# IAM policy for BigQuery Connection Connection
|
597
|
+
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
598
|
+
|
599
|
+
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
600
|
+
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
601
|
+
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
602
|
+
|
603
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
604
|
+
|
605
|
+
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
606
|
+
|
607
|
+
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
608
|
+
|
609
|
+
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
610
|
+
|
573
611
|
## bigquery.ConnectionIamPolicy
|
574
612
|
|
575
613
|
```python
|