pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -380,6 +380,27 @@ class SecretIamBinding(pulumi.CustomResource):
|
|
380
380
|
})
|
381
381
|
```
|
382
382
|
|
383
|
+
## This resource supports User Project Overrides.
|
384
|
+
|
385
|
+
-
|
386
|
+
|
387
|
+
# IAM policy for Secret Manager Secret
|
388
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
389
|
+
|
390
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
391
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
392
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
393
|
+
|
394
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
395
|
+
|
396
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
397
|
+
|
398
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
399
|
+
|
400
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
401
|
+
|
402
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
403
|
+
|
383
404
|
## secretmanager.SecretIamPolicy
|
384
405
|
|
385
406
|
```python
|
@@ -654,6 +675,27 @@ class SecretIamBinding(pulumi.CustomResource):
|
|
654
675
|
})
|
655
676
|
```
|
656
677
|
|
678
|
+
## This resource supports User Project Overrides.
|
679
|
+
|
680
|
+
-
|
681
|
+
|
682
|
+
# IAM policy for Secret Manager Secret
|
683
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
684
|
+
|
685
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
686
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
687
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
688
|
+
|
689
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
690
|
+
|
691
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
692
|
+
|
693
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
694
|
+
|
695
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
696
|
+
|
697
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
698
|
+
|
657
699
|
## secretmanager.SecretIamPolicy
|
658
700
|
|
659
701
|
```python
|
@@ -380,6 +380,27 @@ class SecretIamMember(pulumi.CustomResource):
|
|
380
380
|
})
|
381
381
|
```
|
382
382
|
|
383
|
+
## This resource supports User Project Overrides.
|
384
|
+
|
385
|
+
-
|
386
|
+
|
387
|
+
# IAM policy for Secret Manager Secret
|
388
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
389
|
+
|
390
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
391
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
392
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
393
|
+
|
394
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
395
|
+
|
396
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
397
|
+
|
398
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
399
|
+
|
400
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
401
|
+
|
402
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
403
|
+
|
383
404
|
## secretmanager.SecretIamPolicy
|
384
405
|
|
385
406
|
```python
|
@@ -654,6 +675,27 @@ class SecretIamMember(pulumi.CustomResource):
|
|
654
675
|
})
|
655
676
|
```
|
656
677
|
|
678
|
+
## This resource supports User Project Overrides.
|
679
|
+
|
680
|
+
-
|
681
|
+
|
682
|
+
# IAM policy for Secret Manager Secret
|
683
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
684
|
+
|
685
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
686
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
687
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
688
|
+
|
689
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
690
|
+
|
691
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
692
|
+
|
693
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
694
|
+
|
695
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
696
|
+
|
697
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
698
|
+
|
657
699
|
## secretmanager.SecretIamPolicy
|
658
700
|
|
659
701
|
```python
|
@@ -265,6 +265,27 @@ class SecretIamPolicy(pulumi.CustomResource):
|
|
265
265
|
})
|
266
266
|
```
|
267
267
|
|
268
|
+
## This resource supports User Project Overrides.
|
269
|
+
|
270
|
+
-
|
271
|
+
|
272
|
+
# IAM policy for Secret Manager Secret
|
273
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
274
|
+
|
275
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
276
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
277
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
278
|
+
|
279
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
280
|
+
|
281
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
282
|
+
|
283
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
284
|
+
|
285
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
286
|
+
|
287
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
288
|
+
|
268
289
|
## secretmanager.SecretIamPolicy
|
269
290
|
|
270
291
|
```python
|
@@ -525,6 +546,27 @@ class SecretIamPolicy(pulumi.CustomResource):
|
|
525
546
|
})
|
526
547
|
```
|
527
548
|
|
549
|
+
## This resource supports User Project Overrides.
|
550
|
+
|
551
|
+
-
|
552
|
+
|
553
|
+
# IAM policy for Secret Manager Secret
|
554
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
555
|
+
|
556
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
557
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
558
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
559
|
+
|
560
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
561
|
+
|
562
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
563
|
+
|
564
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
565
|
+
|
566
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
567
|
+
|
568
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
569
|
+
|
528
570
|
## secretmanager.SecretIamPolicy
|
529
571
|
|
530
572
|
```python
|
@@ -371,6 +371,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
371
371
|
member="user:jane@example.com")
|
372
372
|
```
|
373
373
|
|
374
|
+
## This resource supports User Project Overrides.
|
375
|
+
|
376
|
+
-
|
377
|
+
|
378
|
+
# IAM policy for Secure Source Manager Repository
|
379
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
380
|
+
|
381
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
382
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
383
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
384
|
+
|
385
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
386
|
+
|
387
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
388
|
+
|
389
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
390
|
+
|
391
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
392
|
+
|
374
393
|
## securesourcemanager.RepositoryIamPolicy
|
375
394
|
|
376
395
|
```python
|
@@ -545,6 +564,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
545
564
|
member="user:jane@example.com")
|
546
565
|
```
|
547
566
|
|
567
|
+
## This resource supports User Project Overrides.
|
568
|
+
|
569
|
+
-
|
570
|
+
|
571
|
+
# IAM policy for Secure Source Manager Repository
|
572
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
573
|
+
|
574
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
575
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
576
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
577
|
+
|
578
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
579
|
+
|
580
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
581
|
+
|
582
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
583
|
+
|
584
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
585
|
+
|
548
586
|
## securesourcemanager.RepositoryIamPolicy
|
549
587
|
|
550
588
|
```python
|
@@ -371,6 +371,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
371
371
|
member="user:jane@example.com")
|
372
372
|
```
|
373
373
|
|
374
|
+
## This resource supports User Project Overrides.
|
375
|
+
|
376
|
+
-
|
377
|
+
|
378
|
+
# IAM policy for Secure Source Manager Repository
|
379
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
380
|
+
|
381
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
382
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
383
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
384
|
+
|
385
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
386
|
+
|
387
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
388
|
+
|
389
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
390
|
+
|
391
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
392
|
+
|
374
393
|
## securesourcemanager.RepositoryIamPolicy
|
375
394
|
|
376
395
|
```python
|
@@ -545,6 +564,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
545
564
|
member="user:jane@example.com")
|
546
565
|
```
|
547
566
|
|
567
|
+
## This resource supports User Project Overrides.
|
568
|
+
|
569
|
+
-
|
570
|
+
|
571
|
+
# IAM policy for Secure Source Manager Repository
|
572
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
573
|
+
|
574
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
575
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
576
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
577
|
+
|
578
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
579
|
+
|
580
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
581
|
+
|
582
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
583
|
+
|
584
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
585
|
+
|
548
586
|
## securesourcemanager.RepositoryIamPolicy
|
549
587
|
|
550
588
|
```python
|
@@ -268,6 +268,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
268
268
|
member="user:jane@example.com")
|
269
269
|
```
|
270
270
|
|
271
|
+
## This resource supports User Project Overrides.
|
272
|
+
|
273
|
+
-
|
274
|
+
|
275
|
+
# IAM policy for Secure Source Manager Repository
|
276
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
277
|
+
|
278
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
279
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
280
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
281
|
+
|
282
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
283
|
+
|
284
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
285
|
+
|
286
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
287
|
+
|
288
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
289
|
+
|
271
290
|
## securesourcemanager.RepositoryIamPolicy
|
272
291
|
|
273
292
|
```python
|
@@ -430,6 +449,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
430
449
|
member="user:jane@example.com")
|
431
450
|
```
|
432
451
|
|
452
|
+
## This resource supports User Project Overrides.
|
453
|
+
|
454
|
+
-
|
455
|
+
|
456
|
+
# IAM policy for Secure Source Manager Repository
|
457
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
458
|
+
|
459
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
460
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
461
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
462
|
+
|
463
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
+
|
465
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
466
|
+
|
467
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
468
|
+
|
469
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
+
|
433
471
|
## securesourcemanager.RepositoryIamPolicy
|
434
472
|
|
435
473
|
```python
|
@@ -155,9 +155,9 @@ def get_account(account_id: Optional[str] = None,
|
|
155
155
|
myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
|
156
156
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
157
157
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
158
|
-
metadata=
|
159
|
-
name
|
160
|
-
|
158
|
+
metadata={
|
159
|
+
"name": "google-application-credentials",
|
160
|
+
},
|
161
161
|
data={
|
162
162
|
"json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
163
163
|
})
|
@@ -220,9 +220,9 @@ def get_account_output(account_id: Optional[pulumi.Input[str]] = None,
|
|
220
220
|
myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
|
221
221
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
222
222
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
223
|
-
metadata=
|
224
|
-
name
|
225
|
-
|
223
|
+
metadata={
|
224
|
+
"name": "google-application-credentials",
|
225
|
+
},
|
226
226
|
data={
|
227
227
|
"json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
228
228
|
})
|
pulumi_gcp/serviceaccount/key.py
CHANGED
@@ -402,9 +402,9 @@ class Key(pulumi.CustomResource):
|
|
402
402
|
display_name="My Service Account")
|
403
403
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
404
404
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
405
|
-
metadata=
|
406
|
-
name
|
407
|
-
|
405
|
+
metadata={
|
406
|
+
"name": "google-application-credentials",
|
407
|
+
},
|
408
408
|
data={
|
409
409
|
"credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
410
410
|
})
|
@@ -488,9 +488,9 @@ class Key(pulumi.CustomResource):
|
|
488
488
|
display_name="My Service Account")
|
489
489
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
490
490
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
491
|
-
metadata=
|
492
|
-
name
|
493
|
-
|
491
|
+
metadata={
|
492
|
+
"name": "google-application-credentials",
|
493
|
+
},
|
494
494
|
data={
|
495
495
|
"credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
496
496
|
})
|
@@ -280,6 +280,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Namespace
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
293
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Namespace
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
466
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|
@@ -280,6 +280,26 @@ class NamespaceIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Namespace
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
293
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class NamespaceIamMember(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Namespace
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
466
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|
@@ -177,6 +177,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
+
|
182
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
+
---
|
184
|
+
|
185
|
+
# IAM policy for Service Directory Namespace
|
186
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
187
|
+
|
188
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
189
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
190
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
191
|
+
|
192
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
+
|
194
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
195
|
+
|
196
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
197
|
+
|
198
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
+
|
180
200
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
181
201
|
|
182
202
|
```python
|
@@ -318,6 +338,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
|
|
318
338
|
member="user:jane@example.com")
|
319
339
|
```
|
320
340
|
|
341
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
342
|
+
|
343
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
344
|
+
---
|
345
|
+
|
346
|
+
# IAM policy for Service Directory Namespace
|
347
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
348
|
+
|
349
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
350
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
351
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
352
|
+
|
353
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
354
|
+
|
355
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
356
|
+
|
357
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
358
|
+
|
359
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
360
|
+
|
321
361
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
322
362
|
|
323
363
|
```python
|
@@ -280,6 +280,26 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Service
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
293
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Service
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
466
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|