pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -280,6 +280,26 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Service
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
293
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Service
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
466
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|
@@ -177,6 +177,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
+
|
182
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
+
---
|
184
|
+
|
185
|
+
# IAM policy for Service Directory Service
|
186
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
187
|
+
|
188
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
189
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
190
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
191
|
+
|
192
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
+
|
194
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
195
|
+
|
196
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
197
|
+
|
198
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
+
|
180
200
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
181
201
|
|
182
202
|
```python
|
@@ -318,6 +338,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
318
338
|
member="user:jane@example.com")
|
319
339
|
```
|
320
340
|
|
341
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
342
|
+
|
343
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
344
|
+
---
|
345
|
+
|
346
|
+
# IAM policy for Service Directory Service
|
347
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
348
|
+
|
349
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
350
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
351
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
352
|
+
|
353
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
354
|
+
|
355
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
356
|
+
|
357
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
358
|
+
|
359
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
360
|
+
|
321
361
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
322
362
|
|
323
363
|
```python
|
@@ -319,6 +319,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Source Repositories Repository
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
330
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
331
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
336
|
+
|
337
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## sourcerepo.RepositoryIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -478,6 +497,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
478
497
|
member="user:jane@example.com")
|
479
498
|
```
|
480
499
|
|
500
|
+
## This resource supports User Project Overrides.
|
501
|
+
|
502
|
+
-
|
503
|
+
|
504
|
+
# IAM policy for Cloud Source Repositories Repository
|
505
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
506
|
+
|
507
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
508
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
509
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
510
|
+
|
511
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
512
|
+
|
513
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
514
|
+
|
515
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
516
|
+
|
517
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
518
|
+
|
481
519
|
## sourcerepo.RepositoryIamPolicy
|
482
520
|
|
483
521
|
```python
|
@@ -319,6 +319,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Source Repositories Repository
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
330
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
331
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
336
|
+
|
337
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## sourcerepo.RepositoryIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -478,6 +497,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
478
497
|
member="user:jane@example.com")
|
479
498
|
```
|
480
499
|
|
500
|
+
## This resource supports User Project Overrides.
|
501
|
+
|
502
|
+
-
|
503
|
+
|
504
|
+
# IAM policy for Cloud Source Repositories Repository
|
505
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
506
|
+
|
507
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
508
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
509
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
510
|
+
|
511
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
512
|
+
|
513
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
514
|
+
|
515
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
516
|
+
|
517
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
518
|
+
|
481
519
|
## sourcerepo.RepositoryIamPolicy
|
482
520
|
|
483
521
|
```python
|
@@ -216,6 +216,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Cloud Source Repositories Repository
|
224
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
227
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
228
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
233
|
+
|
234
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## sourcerepo.RepositoryIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -363,6 +382,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
363
382
|
member="user:jane@example.com")
|
364
383
|
```
|
365
384
|
|
385
|
+
## This resource supports User Project Overrides.
|
386
|
+
|
387
|
+
-
|
388
|
+
|
389
|
+
# IAM policy for Cloud Source Repositories Repository
|
390
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
391
|
+
|
392
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
393
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
394
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
395
|
+
|
396
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
397
|
+
|
398
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
399
|
+
|
400
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
401
|
+
|
402
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
403
|
+
|
366
404
|
## sourcerepo.RepositoryIamPolicy
|
367
405
|
|
368
406
|
```python
|
@@ -407,43 +407,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
|
|
407
407
|
})
|
408
408
|
```
|
409
409
|
|
410
|
-
## spanner.DatabaseIAMPolicy
|
411
|
-
|
412
|
-
```python
|
413
|
-
import pulumi
|
414
|
-
import pulumi_gcp as gcp
|
415
|
-
|
416
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
417
|
-
"role": "roles/editor",
|
418
|
-
"members": ["user:jane@example.com"],
|
419
|
-
}])
|
420
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
421
|
-
instance="your-instance-name",
|
422
|
-
database="your-database-name",
|
423
|
-
policy_data=admin.policy_data)
|
424
|
-
```
|
425
|
-
|
426
|
-
With IAM Conditions:
|
427
|
-
|
428
|
-
```python
|
429
|
-
import pulumi
|
430
|
-
import pulumi_gcp as gcp
|
431
|
-
|
432
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
433
|
-
"role": "roles/editor",
|
434
|
-
"members": ["user:jane@example.com"],
|
435
|
-
"condition": {
|
436
|
-
"title": "My Role",
|
437
|
-
"description": "Grant permissions on my_role",
|
438
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
439
|
-
},
|
440
|
-
}])
|
441
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
442
|
-
instance="your-instance-name",
|
443
|
-
database="your-database-name",
|
444
|
-
policy_data=admin.policy_data)
|
445
|
-
```
|
446
|
-
|
447
410
|
## spanner.DatabaseIAMBinding
|
448
411
|
|
449
412
|
```python
|
@@ -671,43 +634,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
|
|
671
634
|
})
|
672
635
|
```
|
673
636
|
|
674
|
-
## spanner.DatabaseIAMPolicy
|
675
|
-
|
676
|
-
```python
|
677
|
-
import pulumi
|
678
|
-
import pulumi_gcp as gcp
|
679
|
-
|
680
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
681
|
-
"role": "roles/editor",
|
682
|
-
"members": ["user:jane@example.com"],
|
683
|
-
}])
|
684
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
685
|
-
instance="your-instance-name",
|
686
|
-
database="your-database-name",
|
687
|
-
policy_data=admin.policy_data)
|
688
|
-
```
|
689
|
-
|
690
|
-
With IAM Conditions:
|
691
|
-
|
692
|
-
```python
|
693
|
-
import pulumi
|
694
|
-
import pulumi_gcp as gcp
|
695
|
-
|
696
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
697
|
-
"role": "roles/editor",
|
698
|
-
"members": ["user:jane@example.com"],
|
699
|
-
"condition": {
|
700
|
-
"title": "My Role",
|
701
|
-
"description": "Grant permissions on my_role",
|
702
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
703
|
-
},
|
704
|
-
}])
|
705
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
706
|
-
instance="your-instance-name",
|
707
|
-
database="your-database-name",
|
708
|
-
policy_data=admin.policy_data)
|
709
|
-
```
|
710
|
-
|
711
637
|
## spanner.DatabaseIAMBinding
|
712
638
|
|
713
639
|
```python
|
@@ -407,43 +407,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
|
|
407
407
|
})
|
408
408
|
```
|
409
409
|
|
410
|
-
## spanner.DatabaseIAMPolicy
|
411
|
-
|
412
|
-
```python
|
413
|
-
import pulumi
|
414
|
-
import pulumi_gcp as gcp
|
415
|
-
|
416
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
417
|
-
"role": "roles/editor",
|
418
|
-
"members": ["user:jane@example.com"],
|
419
|
-
}])
|
420
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
421
|
-
instance="your-instance-name",
|
422
|
-
database="your-database-name",
|
423
|
-
policy_data=admin.policy_data)
|
424
|
-
```
|
425
|
-
|
426
|
-
With IAM Conditions:
|
427
|
-
|
428
|
-
```python
|
429
|
-
import pulumi
|
430
|
-
import pulumi_gcp as gcp
|
431
|
-
|
432
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
433
|
-
"role": "roles/editor",
|
434
|
-
"members": ["user:jane@example.com"],
|
435
|
-
"condition": {
|
436
|
-
"title": "My Role",
|
437
|
-
"description": "Grant permissions on my_role",
|
438
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
439
|
-
},
|
440
|
-
}])
|
441
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
442
|
-
instance="your-instance-name",
|
443
|
-
database="your-database-name",
|
444
|
-
policy_data=admin.policy_data)
|
445
|
-
```
|
446
|
-
|
447
410
|
## spanner.DatabaseIAMBinding
|
448
411
|
|
449
412
|
```python
|
@@ -671,43 +634,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
|
|
671
634
|
})
|
672
635
|
```
|
673
636
|
|
674
|
-
## spanner.DatabaseIAMPolicy
|
675
|
-
|
676
|
-
```python
|
677
|
-
import pulumi
|
678
|
-
import pulumi_gcp as gcp
|
679
|
-
|
680
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
681
|
-
"role": "roles/editor",
|
682
|
-
"members": ["user:jane@example.com"],
|
683
|
-
}])
|
684
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
685
|
-
instance="your-instance-name",
|
686
|
-
database="your-database-name",
|
687
|
-
policy_data=admin.policy_data)
|
688
|
-
```
|
689
|
-
|
690
|
-
With IAM Conditions:
|
691
|
-
|
692
|
-
```python
|
693
|
-
import pulumi
|
694
|
-
import pulumi_gcp as gcp
|
695
|
-
|
696
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
697
|
-
"role": "roles/editor",
|
698
|
-
"members": ["user:jane@example.com"],
|
699
|
-
"condition": {
|
700
|
-
"title": "My Role",
|
701
|
-
"description": "Grant permissions on my_role",
|
702
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
703
|
-
},
|
704
|
-
}])
|
705
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
706
|
-
instance="your-instance-name",
|
707
|
-
database="your-database-name",
|
708
|
-
policy_data=admin.policy_data)
|
709
|
-
```
|
710
|
-
|
711
637
|
## spanner.DatabaseIAMBinding
|
712
638
|
|
713
639
|
```python
|
@@ -304,43 +304,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
|
|
304
304
|
})
|
305
305
|
```
|
306
306
|
|
307
|
-
## spanner.DatabaseIAMPolicy
|
308
|
-
|
309
|
-
```python
|
310
|
-
import pulumi
|
311
|
-
import pulumi_gcp as gcp
|
312
|
-
|
313
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
314
|
-
"role": "roles/editor",
|
315
|
-
"members": ["user:jane@example.com"],
|
316
|
-
}])
|
317
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
318
|
-
instance="your-instance-name",
|
319
|
-
database="your-database-name",
|
320
|
-
policy_data=admin.policy_data)
|
321
|
-
```
|
322
|
-
|
323
|
-
With IAM Conditions:
|
324
|
-
|
325
|
-
```python
|
326
|
-
import pulumi
|
327
|
-
import pulumi_gcp as gcp
|
328
|
-
|
329
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
330
|
-
"role": "roles/editor",
|
331
|
-
"members": ["user:jane@example.com"],
|
332
|
-
"condition": {
|
333
|
-
"title": "My Role",
|
334
|
-
"description": "Grant permissions on my_role",
|
335
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
336
|
-
},
|
337
|
-
}])
|
338
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
339
|
-
instance="your-instance-name",
|
340
|
-
database="your-database-name",
|
341
|
-
policy_data=admin.policy_data)
|
342
|
-
```
|
343
|
-
|
344
307
|
## spanner.DatabaseIAMBinding
|
345
308
|
|
346
309
|
```python
|
@@ -557,43 +520,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
|
|
557
520
|
})
|
558
521
|
```
|
559
522
|
|
560
|
-
## spanner.DatabaseIAMPolicy
|
561
|
-
|
562
|
-
```python
|
563
|
-
import pulumi
|
564
|
-
import pulumi_gcp as gcp
|
565
|
-
|
566
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
567
|
-
"role": "roles/editor",
|
568
|
-
"members": ["user:jane@example.com"],
|
569
|
-
}])
|
570
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
571
|
-
instance="your-instance-name",
|
572
|
-
database="your-database-name",
|
573
|
-
policy_data=admin.policy_data)
|
574
|
-
```
|
575
|
-
|
576
|
-
With IAM Conditions:
|
577
|
-
|
578
|
-
```python
|
579
|
-
import pulumi
|
580
|
-
import pulumi_gcp as gcp
|
581
|
-
|
582
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
583
|
-
"role": "roles/editor",
|
584
|
-
"members": ["user:jane@example.com"],
|
585
|
-
"condition": {
|
586
|
-
"title": "My Role",
|
587
|
-
"description": "Grant permissions on my_role",
|
588
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
589
|
-
},
|
590
|
-
}])
|
591
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
592
|
-
instance="your-instance-name",
|
593
|
-
database="your-database-name",
|
594
|
-
policy_data=admin.policy_data)
|
595
|
-
```
|
596
|
-
|
597
523
|
## spanner.DatabaseIAMBinding
|
598
524
|
|
599
525
|
```python
|
@@ -303,21 +303,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
303
303
|
member="user:jane@example.com")
|
304
304
|
```
|
305
305
|
|
306
|
-
## spanner.InstanceIAMPolicy
|
307
|
-
|
308
|
-
```python
|
309
|
-
import pulumi
|
310
|
-
import pulumi_gcp as gcp
|
311
|
-
|
312
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
313
|
-
"role": "roles/editor",
|
314
|
-
"members": ["user:jane@example.com"],
|
315
|
-
}])
|
316
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
317
|
-
instance="your-instance-name",
|
318
|
-
policy_data=admin.policy_data)
|
319
|
-
```
|
320
|
-
|
321
306
|
## spanner.InstanceIAMBinding
|
322
307
|
|
323
308
|
```python
|
@@ -444,21 +429,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
444
429
|
member="user:jane@example.com")
|
445
430
|
```
|
446
431
|
|
447
|
-
## spanner.InstanceIAMPolicy
|
448
|
-
|
449
|
-
```python
|
450
|
-
import pulumi
|
451
|
-
import pulumi_gcp as gcp
|
452
|
-
|
453
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
454
|
-
"role": "roles/editor",
|
455
|
-
"members": ["user:jane@example.com"],
|
456
|
-
}])
|
457
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
458
|
-
instance="your-instance-name",
|
459
|
-
policy_data=admin.policy_data)
|
460
|
-
```
|
461
|
-
|
462
432
|
## spanner.InstanceIAMBinding
|
463
433
|
|
464
434
|
```python
|
@@ -303,21 +303,6 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
303
303
|
member="user:jane@example.com")
|
304
304
|
```
|
305
305
|
|
306
|
-
## spanner.InstanceIAMPolicy
|
307
|
-
|
308
|
-
```python
|
309
|
-
import pulumi
|
310
|
-
import pulumi_gcp as gcp
|
311
|
-
|
312
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
313
|
-
"role": "roles/editor",
|
314
|
-
"members": ["user:jane@example.com"],
|
315
|
-
}])
|
316
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
317
|
-
instance="your-instance-name",
|
318
|
-
policy_data=admin.policy_data)
|
319
|
-
```
|
320
|
-
|
321
306
|
## spanner.InstanceIAMBinding
|
322
307
|
|
323
308
|
```python
|
@@ -444,21 +429,6 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
444
429
|
member="user:jane@example.com")
|
445
430
|
```
|
446
431
|
|
447
|
-
## spanner.InstanceIAMPolicy
|
448
|
-
|
449
|
-
```python
|
450
|
-
import pulumi
|
451
|
-
import pulumi_gcp as gcp
|
452
|
-
|
453
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
454
|
-
"role": "roles/editor",
|
455
|
-
"members": ["user:jane@example.com"],
|
456
|
-
}])
|
457
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
458
|
-
instance="your-instance-name",
|
459
|
-
policy_data=admin.policy_data)
|
460
|
-
```
|
461
|
-
|
462
432
|
## spanner.InstanceIAMBinding
|
463
433
|
|
464
434
|
```python
|
@@ -212,21 +212,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
212
212
|
member="user:jane@example.com")
|
213
213
|
```
|
214
214
|
|
215
|
-
## spanner.InstanceIAMPolicy
|
216
|
-
|
217
|
-
```python
|
218
|
-
import pulumi
|
219
|
-
import pulumi_gcp as gcp
|
220
|
-
|
221
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
222
|
-
"role": "roles/editor",
|
223
|
-
"members": ["user:jane@example.com"],
|
224
|
-
}])
|
225
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
226
|
-
instance="your-instance-name",
|
227
|
-
policy_data=admin.policy_data)
|
228
|
-
```
|
229
|
-
|
230
215
|
## spanner.InstanceIAMBinding
|
231
216
|
|
232
217
|
```python
|
@@ -344,21 +329,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
344
329
|
member="user:jane@example.com")
|
345
330
|
```
|
346
331
|
|
347
|
-
## spanner.InstanceIAMPolicy
|
348
|
-
|
349
|
-
```python
|
350
|
-
import pulumi
|
351
|
-
import pulumi_gcp as gcp
|
352
|
-
|
353
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
354
|
-
"role": "roles/editor",
|
355
|
-
"members": ["user:jane@example.com"],
|
356
|
-
}])
|
357
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
358
|
-
instance="your-instance-name",
|
359
|
-
policy_data=admin.policy_data)
|
360
|
-
```
|
361
|
-
|
362
332
|
## spanner.InstanceIAMBinding
|
363
333
|
|
364
334
|
```python
|