pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -285,53 +285,6 @@ class IAMPolicy(pulumi.CustomResource):
|
|
285
285
|
])
|
286
286
|
```
|
287
287
|
|
288
|
-
## organizations.IAMPolicy
|
289
|
-
|
290
|
-
!> **Warning:** New organizations have several default policies which will,
|
291
|
-
without extreme caution, be **overwritten** by use of this resource.
|
292
|
-
The safest alternative is to use multiple `organizations.IAMBinding`
|
293
|
-
resources. This resource makes it easy to remove your own access to
|
294
|
-
an organization, which will require a call to Google Support to have
|
295
|
-
fixed, and can take multiple days to resolve.
|
296
|
-
|
297
|
-
In general, this resource should only be used with organizations
|
298
|
-
fully managed by this provider.I f you do use this resource,
|
299
|
-
the best way to be sure that you are not making dangerous changes is to start
|
300
|
-
by **importing** your existing policy, and examining the diff very closely.
|
301
|
-
|
302
|
-
```python
|
303
|
-
import pulumi
|
304
|
-
import pulumi_gcp as gcp
|
305
|
-
|
306
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
307
|
-
"role": "roles/editor",
|
308
|
-
"members": ["user:jane@example.com"],
|
309
|
-
}])
|
310
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
311
|
-
org_id="1234567890",
|
312
|
-
policy_data=admin.policy_data)
|
313
|
-
```
|
314
|
-
|
315
|
-
With IAM Conditions:
|
316
|
-
|
317
|
-
```python
|
318
|
-
import pulumi
|
319
|
-
import pulumi_gcp as gcp
|
320
|
-
|
321
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
322
|
-
"role": "roles/editor",
|
323
|
-
"members": ["user:jane@example.com"],
|
324
|
-
"condition": {
|
325
|
-
"title": "expires_after_2019_12_31",
|
326
|
-
"description": "Expiring at midnight of 2019-12-31",
|
327
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
328
|
-
},
|
329
|
-
}])
|
330
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
331
|
-
org_id="1234567890",
|
332
|
-
policy_data=admin.policy_data)
|
333
|
-
```
|
334
|
-
|
335
288
|
## organizations.IAMBinding
|
336
289
|
|
337
290
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -595,53 +548,6 @@ class IAMPolicy(pulumi.CustomResource):
|
|
595
548
|
])
|
596
549
|
```
|
597
550
|
|
598
|
-
## organizations.IAMPolicy
|
599
|
-
|
600
|
-
!> **Warning:** New organizations have several default policies which will,
|
601
|
-
without extreme caution, be **overwritten** by use of this resource.
|
602
|
-
The safest alternative is to use multiple `organizations.IAMBinding`
|
603
|
-
resources. This resource makes it easy to remove your own access to
|
604
|
-
an organization, which will require a call to Google Support to have
|
605
|
-
fixed, and can take multiple days to resolve.
|
606
|
-
|
607
|
-
In general, this resource should only be used with organizations
|
608
|
-
fully managed by this provider.I f you do use this resource,
|
609
|
-
the best way to be sure that you are not making dangerous changes is to start
|
610
|
-
by **importing** your existing policy, and examining the diff very closely.
|
611
|
-
|
612
|
-
```python
|
613
|
-
import pulumi
|
614
|
-
import pulumi_gcp as gcp
|
615
|
-
|
616
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
617
|
-
"role": "roles/editor",
|
618
|
-
"members": ["user:jane@example.com"],
|
619
|
-
}])
|
620
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
621
|
-
org_id="1234567890",
|
622
|
-
policy_data=admin.policy_data)
|
623
|
-
```
|
624
|
-
|
625
|
-
With IAM Conditions:
|
626
|
-
|
627
|
-
```python
|
628
|
-
import pulumi
|
629
|
-
import pulumi_gcp as gcp
|
630
|
-
|
631
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
632
|
-
"role": "roles/editor",
|
633
|
-
"members": ["user:jane@example.com"],
|
634
|
-
"condition": {
|
635
|
-
"title": "expires_after_2019_12_31",
|
636
|
-
"description": "Expiring at midnight of 2019-12-31",
|
637
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
638
|
-
},
|
639
|
-
}])
|
640
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
641
|
-
org_id="1234567890",
|
642
|
-
policy_data=admin.policy_data)
|
643
|
-
```
|
644
|
-
|
645
551
|
## organizations.IAMBinding
|
646
552
|
|
647
553
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -54,7 +54,7 @@ class ProjectArgs:
|
|
54
54
|
organization.
|
55
55
|
:param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
|
56
56
|
:param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
|
57
|
-
without deleting the Project via the Google API.
|
57
|
+
without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
|
58
58
|
"""
|
59
59
|
if auto_create_network is not None:
|
60
60
|
pulumi.set(__self__, "auto_create_network", auto_create_network)
|
@@ -70,6 +70,9 @@ class ProjectArgs:
|
|
70
70
|
pulumi.set(__self__, "org_id", org_id)
|
71
71
|
if project_id is not None:
|
72
72
|
pulumi.set(__self__, "project_id", project_id)
|
73
|
+
if skip_delete is not None:
|
74
|
+
warnings.warn("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""", DeprecationWarning)
|
75
|
+
pulumi.log.warn("""skip_delete is deprecated: skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
|
73
76
|
if skip_delete is not None:
|
74
77
|
pulumi.set(__self__, "skip_delete", skip_delete)
|
75
78
|
|
@@ -176,10 +179,11 @@ class ProjectArgs:
|
|
176
179
|
|
177
180
|
@property
|
178
181
|
@pulumi.getter(name="skipDelete")
|
182
|
+
@_utilities.deprecated("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
|
179
183
|
def skip_delete(self) -> Optional[pulumi.Input[bool]]:
|
180
184
|
"""
|
181
185
|
If true, the resource can be deleted
|
182
|
-
without deleting the Project via the Google API.
|
186
|
+
without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
|
183
187
|
"""
|
184
188
|
return pulumi.get(self, "skip_delete")
|
185
189
|
|
@@ -232,7 +236,7 @@ class _ProjectState:
|
|
232
236
|
:param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
|
233
237
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] pulumi_labels: The combination of labels configured directly on the resource and default labels configured on the provider.
|
234
238
|
:param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
|
235
|
-
without deleting the Project via the Google API.
|
239
|
+
without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
|
236
240
|
"""
|
237
241
|
if auto_create_network is not None:
|
238
242
|
pulumi.set(__self__, "auto_create_network", auto_create_network)
|
@@ -254,6 +258,9 @@ class _ProjectState:
|
|
254
258
|
pulumi.set(__self__, "project_id", project_id)
|
255
259
|
if pulumi_labels is not None:
|
256
260
|
pulumi.set(__self__, "pulumi_labels", pulumi_labels)
|
261
|
+
if skip_delete is not None:
|
262
|
+
warnings.warn("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""", DeprecationWarning)
|
263
|
+
pulumi.log.warn("""skip_delete is deprecated: skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
|
257
264
|
if skip_delete is not None:
|
258
265
|
pulumi.set(__self__, "skip_delete", skip_delete)
|
259
266
|
|
@@ -396,10 +403,11 @@ class _ProjectState:
|
|
396
403
|
|
397
404
|
@property
|
398
405
|
@pulumi.getter(name="skipDelete")
|
406
|
+
@_utilities.deprecated("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
|
399
407
|
def skip_delete(self) -> Optional[pulumi.Input[bool]]:
|
400
408
|
"""
|
401
409
|
If true, the resource can be deleted
|
402
|
-
without deleting the Project via the Google API.
|
410
|
+
without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
|
403
411
|
"""
|
404
412
|
return pulumi.get(self, "skip_delete")
|
405
413
|
|
@@ -507,7 +515,7 @@ class Project(pulumi.CustomResource):
|
|
507
515
|
organization.
|
508
516
|
:param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
|
509
517
|
:param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
|
510
|
-
without deleting the Project via the Google API.
|
518
|
+
without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
|
511
519
|
"""
|
512
520
|
...
|
513
521
|
@overload
|
@@ -674,7 +682,7 @@ class Project(pulumi.CustomResource):
|
|
674
682
|
:param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
|
675
683
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] pulumi_labels: The combination of labels configured directly on the resource and default labels configured on the provider.
|
676
684
|
:param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
|
677
|
-
without deleting the Project via the Google API.
|
685
|
+
without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
|
678
686
|
"""
|
679
687
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
680
688
|
|
@@ -792,10 +800,11 @@ class Project(pulumi.CustomResource):
|
|
792
800
|
|
793
801
|
@property
|
794
802
|
@pulumi.getter(name="skipDelete")
|
803
|
+
@_utilities.deprecated("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
|
795
804
|
def skip_delete(self) -> pulumi.Output[bool]:
|
796
805
|
"""
|
797
806
|
If true, the resource can be deleted
|
798
|
-
without deleting the Project via the Google API.
|
807
|
+
without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
|
799
808
|
"""
|
800
809
|
return pulumi.get(self, "skip_delete")
|
801
810
|
|
@@ -319,6 +319,25 @@ class SchemaIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Schema
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
330
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
331
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
336
|
+
|
337
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.SchemaIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class SchemaIamBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Schema
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
510
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
511
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
516
|
+
|
517
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.SchemaIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class SchemaIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Schema
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
330
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
331
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
336
|
+
|
337
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.SchemaIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class SchemaIamMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Schema
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
510
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
511
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
516
|
+
|
517
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.SchemaIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class SchemaIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Cloud Pub/Sub Schema
|
224
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
227
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
228
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
233
|
+
|
234
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## pubsub.SchemaIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class SchemaIamPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Cloud Pub/Sub Schema
|
392
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
395
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
396
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
401
|
+
|
402
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## pubsub.SchemaIamPolicy
|
369
407
|
|
370
408
|
```python
|
@@ -300,21 +300,6 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
|
|
300
300
|
member="user:jane@example.com")
|
301
301
|
```
|
302
302
|
|
303
|
-
## pubsub.SubscriptionIAMPolicy
|
304
|
-
|
305
|
-
```python
|
306
|
-
import pulumi
|
307
|
-
import pulumi_gcp as gcp
|
308
|
-
|
309
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
310
|
-
"role": "roles/editor",
|
311
|
-
"members": ["user:jane@example.com"],
|
312
|
-
}])
|
313
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
314
|
-
subscription="your-subscription-name",
|
315
|
-
policy_data=admin.policy_data)
|
316
|
-
```
|
317
|
-
|
318
303
|
## pubsub.SubscriptionIAMBinding
|
319
304
|
|
320
305
|
```python
|
@@ -438,21 +423,6 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
|
|
438
423
|
member="user:jane@example.com")
|
439
424
|
```
|
440
425
|
|
441
|
-
## pubsub.SubscriptionIAMPolicy
|
442
|
-
|
443
|
-
```python
|
444
|
-
import pulumi
|
445
|
-
import pulumi_gcp as gcp
|
446
|
-
|
447
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
448
|
-
"role": "roles/editor",
|
449
|
-
"members": ["user:jane@example.com"],
|
450
|
-
}])
|
451
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
452
|
-
subscription="your-subscription-name",
|
453
|
-
policy_data=admin.policy_data)
|
454
|
-
```
|
455
|
-
|
456
426
|
## pubsub.SubscriptionIAMBinding
|
457
427
|
|
458
428
|
```python
|
@@ -300,21 +300,6 @@ class SubscriptionIAMMember(pulumi.CustomResource):
|
|
300
300
|
member="user:jane@example.com")
|
301
301
|
```
|
302
302
|
|
303
|
-
## pubsub.SubscriptionIAMPolicy
|
304
|
-
|
305
|
-
```python
|
306
|
-
import pulumi
|
307
|
-
import pulumi_gcp as gcp
|
308
|
-
|
309
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
310
|
-
"role": "roles/editor",
|
311
|
-
"members": ["user:jane@example.com"],
|
312
|
-
}])
|
313
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
314
|
-
subscription="your-subscription-name",
|
315
|
-
policy_data=admin.policy_data)
|
316
|
-
```
|
317
|
-
|
318
303
|
## pubsub.SubscriptionIAMBinding
|
319
304
|
|
320
305
|
```python
|
@@ -438,21 +423,6 @@ class SubscriptionIAMMember(pulumi.CustomResource):
|
|
438
423
|
member="user:jane@example.com")
|
439
424
|
```
|
440
425
|
|
441
|
-
## pubsub.SubscriptionIAMPolicy
|
442
|
-
|
443
|
-
```python
|
444
|
-
import pulumi
|
445
|
-
import pulumi_gcp as gcp
|
446
|
-
|
447
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
448
|
-
"role": "roles/editor",
|
449
|
-
"members": ["user:jane@example.com"],
|
450
|
-
}])
|
451
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
452
|
-
subscription="your-subscription-name",
|
453
|
-
policy_data=admin.policy_data)
|
454
|
-
```
|
455
|
-
|
456
426
|
## pubsub.SubscriptionIAMBinding
|
457
427
|
|
458
428
|
```python
|
@@ -217,21 +217,6 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
|
|
217
217
|
member="user:jane@example.com")
|
218
218
|
```
|
219
219
|
|
220
|
-
## pubsub.SubscriptionIAMPolicy
|
221
|
-
|
222
|
-
```python
|
223
|
-
import pulumi
|
224
|
-
import pulumi_gcp as gcp
|
225
|
-
|
226
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
227
|
-
"role": "roles/editor",
|
228
|
-
"members": ["user:jane@example.com"],
|
229
|
-
}])
|
230
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
231
|
-
subscription="your-subscription-name",
|
232
|
-
policy_data=admin.policy_data)
|
233
|
-
```
|
234
|
-
|
235
220
|
## pubsub.SubscriptionIAMBinding
|
236
221
|
|
237
222
|
```python
|
@@ -348,21 +333,6 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
|
|
348
333
|
member="user:jane@example.com")
|
349
334
|
```
|
350
335
|
|
351
|
-
## pubsub.SubscriptionIAMPolicy
|
352
|
-
|
353
|
-
```python
|
354
|
-
import pulumi
|
355
|
-
import pulumi_gcp as gcp
|
356
|
-
|
357
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
358
|
-
"role": "roles/editor",
|
359
|
-
"members": ["user:jane@example.com"],
|
360
|
-
}])
|
361
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
362
|
-
subscription="your-subscription-name",
|
363
|
-
policy_data=admin.policy_data)
|
364
|
-
```
|
365
|
-
|
366
336
|
## pubsub.SubscriptionIAMBinding
|
367
337
|
|
368
338
|
```python
|
@@ -319,6 +319,25 @@ class TopicIAMBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Topic
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
330
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
331
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
336
|
+
|
337
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.TopicIAMPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class TopicIAMBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Topic
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
510
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
511
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
516
|
+
|
517
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.TopicIAMPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class TopicIAMMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Topic
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
330
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
331
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
336
|
+
|
337
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.TopicIAMPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class TopicIAMMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Topic
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
510
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
511
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
516
|
+
|
517
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.TopicIAMPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class TopicIAMPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Cloud Pub/Sub Topic
|
224
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
227
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
228
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
233
|
+
|
234
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## pubsub.TopicIAMPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class TopicIAMPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Cloud Pub/Sub Topic
|
392
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
395
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
396
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
401
|
+
|
402
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## pubsub.TopicIAMPolicy
|
369
407
|
|
370
408
|
```python
|
pulumi_gcp/pulumi-plugin.json
CHANGED