pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -288,6 +288,25 @@ class ConnectionIamPolicy(pulumi.CustomResource):
|
|
288
288
|
member="user:jane@example.com")
|
289
289
|
```
|
290
290
|
|
291
|
+
## This resource supports User Project Overrides.
|
292
|
+
|
293
|
+
-
|
294
|
+
|
295
|
+
# IAM policy for BigQuery Connection Connection
|
296
|
+
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
297
|
+
|
298
|
+
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
299
|
+
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
300
|
+
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
301
|
+
|
302
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
303
|
+
|
304
|
+
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
305
|
+
|
306
|
+
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
307
|
+
|
308
|
+
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
309
|
+
|
291
310
|
## bigquery.ConnectionIamPolicy
|
292
311
|
|
293
312
|
```python
|
@@ -455,6 +474,25 @@ class ConnectionIamPolicy(pulumi.CustomResource):
|
|
455
474
|
member="user:jane@example.com")
|
456
475
|
```
|
457
476
|
|
477
|
+
## This resource supports User Project Overrides.
|
478
|
+
|
479
|
+
-
|
480
|
+
|
481
|
+
# IAM policy for BigQuery Connection Connection
|
482
|
+
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
483
|
+
|
484
|
+
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
485
|
+
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
486
|
+
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
487
|
+
|
488
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
489
|
+
|
490
|
+
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
491
|
+
|
492
|
+
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
493
|
+
|
494
|
+
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
495
|
+
|
458
496
|
## bigquery.ConnectionIamPolicy
|
459
497
|
|
460
498
|
```python
|
@@ -693,6 +693,32 @@ class DataTransferConfig(pulumi.CustomResource):
|
|
693
693
|
},
|
694
694
|
opts = pulumi.ResourceOptions(depends_on=[permissions]))
|
695
695
|
```
|
696
|
+
### Bigquerydatatransfer Config Salesforce
|
697
|
+
|
698
|
+
```python
|
699
|
+
import pulumi
|
700
|
+
import pulumi_gcp as gcp
|
701
|
+
|
702
|
+
project = gcp.organizations.get_project()
|
703
|
+
my_dataset = gcp.bigquery.Dataset("my_dataset",
|
704
|
+
dataset_id="my_dataset",
|
705
|
+
description="My dataset",
|
706
|
+
location="asia-northeast1")
|
707
|
+
salesforce_config = gcp.bigquery.DataTransferConfig("salesforce_config",
|
708
|
+
display_name="my-salesforce-config",
|
709
|
+
location="asia-northeast1",
|
710
|
+
data_source_id="salesforce",
|
711
|
+
schedule="first sunday of quarter 00:00",
|
712
|
+
destination_dataset_id=my_dataset.dataset_id,
|
713
|
+
params={
|
714
|
+
"connector.authentication.oauth.clientId": "client-id",
|
715
|
+
"connector.authentication.oauth.clientSecret": "client-secret",
|
716
|
+
"connector.authentication.username": "username",
|
717
|
+
"connector.authentication.password": "password",
|
718
|
+
"connector.authentication.securityToken": "security-token",
|
719
|
+
"assets": "[\\"asset-a\\",\\"asset-b\\"]",
|
720
|
+
})
|
721
|
+
```
|
696
722
|
|
697
723
|
## Import
|
698
724
|
|
@@ -803,6 +829,32 @@ class DataTransferConfig(pulumi.CustomResource):
|
|
803
829
|
},
|
804
830
|
opts = pulumi.ResourceOptions(depends_on=[permissions]))
|
805
831
|
```
|
832
|
+
### Bigquerydatatransfer Config Salesforce
|
833
|
+
|
834
|
+
```python
|
835
|
+
import pulumi
|
836
|
+
import pulumi_gcp as gcp
|
837
|
+
|
838
|
+
project = gcp.organizations.get_project()
|
839
|
+
my_dataset = gcp.bigquery.Dataset("my_dataset",
|
840
|
+
dataset_id="my_dataset",
|
841
|
+
description="My dataset",
|
842
|
+
location="asia-northeast1")
|
843
|
+
salesforce_config = gcp.bigquery.DataTransferConfig("salesforce_config",
|
844
|
+
display_name="my-salesforce-config",
|
845
|
+
location="asia-northeast1",
|
846
|
+
data_source_id="salesforce",
|
847
|
+
schedule="first sunday of quarter 00:00",
|
848
|
+
destination_dataset_id=my_dataset.dataset_id,
|
849
|
+
params={
|
850
|
+
"connector.authentication.oauth.clientId": "client-id",
|
851
|
+
"connector.authentication.oauth.clientSecret": "client-secret",
|
852
|
+
"connector.authentication.username": "username",
|
853
|
+
"connector.authentication.password": "password",
|
854
|
+
"connector.authentication.securityToken": "security-token",
|
855
|
+
"assets": "[\\"asset-a\\",\\"asset-b\\"]",
|
856
|
+
})
|
857
|
+
```
|
806
858
|
|
807
859
|
## Import
|
808
860
|
|
@@ -315,22 +315,6 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
315
315
|
member="user:jane@example.com")
|
316
316
|
```
|
317
317
|
|
318
|
-
## bigquery.DatasetIamPolicy
|
319
|
-
|
320
|
-
```python
|
321
|
-
import pulumi
|
322
|
-
import pulumi_gcp as gcp
|
323
|
-
|
324
|
-
owner = gcp.organizations.get_iam_policy(bindings=[{
|
325
|
-
"role": "roles/bigquery.dataOwner",
|
326
|
-
"members": ["user:jane@example.com"],
|
327
|
-
}])
|
328
|
-
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
329
|
-
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
330
|
-
dataset_id=dataset_dataset.dataset_id,
|
331
|
-
policy_data=owner.policy_data)
|
332
|
-
```
|
333
|
-
|
334
318
|
## bigquery.DatasetIamBinding
|
335
319
|
|
336
320
|
```python
|
@@ -468,22 +452,6 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
468
452
|
member="user:jane@example.com")
|
469
453
|
```
|
470
454
|
|
471
|
-
## bigquery.DatasetIamPolicy
|
472
|
-
|
473
|
-
```python
|
474
|
-
import pulumi
|
475
|
-
import pulumi_gcp as gcp
|
476
|
-
|
477
|
-
owner = gcp.organizations.get_iam_policy(bindings=[{
|
478
|
-
"role": "roles/bigquery.dataOwner",
|
479
|
-
"members": ["user:jane@example.com"],
|
480
|
-
}])
|
481
|
-
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
482
|
-
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
483
|
-
dataset_id=dataset_dataset.dataset_id,
|
484
|
-
policy_data=owner.policy_data)
|
485
|
-
```
|
486
|
-
|
487
455
|
## bigquery.DatasetIamBinding
|
488
456
|
|
489
457
|
```python
|
@@ -315,22 +315,6 @@ class DatasetIamMember(pulumi.CustomResource):
|
|
315
315
|
member="user:jane@example.com")
|
316
316
|
```
|
317
317
|
|
318
|
-
## bigquery.DatasetIamPolicy
|
319
|
-
|
320
|
-
```python
|
321
|
-
import pulumi
|
322
|
-
import pulumi_gcp as gcp
|
323
|
-
|
324
|
-
owner = gcp.organizations.get_iam_policy(bindings=[{
|
325
|
-
"role": "roles/bigquery.dataOwner",
|
326
|
-
"members": ["user:jane@example.com"],
|
327
|
-
}])
|
328
|
-
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
329
|
-
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
330
|
-
dataset_id=dataset_dataset.dataset_id,
|
331
|
-
policy_data=owner.policy_data)
|
332
|
-
```
|
333
|
-
|
334
318
|
## bigquery.DatasetIamBinding
|
335
319
|
|
336
320
|
```python
|
@@ -468,22 +452,6 @@ class DatasetIamMember(pulumi.CustomResource):
|
|
468
452
|
member="user:jane@example.com")
|
469
453
|
```
|
470
454
|
|
471
|
-
## bigquery.DatasetIamPolicy
|
472
|
-
|
473
|
-
```python
|
474
|
-
import pulumi
|
475
|
-
import pulumi_gcp as gcp
|
476
|
-
|
477
|
-
owner = gcp.organizations.get_iam_policy(bindings=[{
|
478
|
-
"role": "roles/bigquery.dataOwner",
|
479
|
-
"members": ["user:jane@example.com"],
|
480
|
-
}])
|
481
|
-
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
482
|
-
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
483
|
-
dataset_id=dataset_dataset.dataset_id,
|
484
|
-
policy_data=owner.policy_data)
|
485
|
-
```
|
486
|
-
|
487
455
|
## bigquery.DatasetIamBinding
|
488
456
|
|
489
457
|
```python
|
@@ -220,22 +220,6 @@ class DatasetIamPolicy(pulumi.CustomResource):
|
|
220
220
|
member="user:jane@example.com")
|
221
221
|
```
|
222
222
|
|
223
|
-
## bigquery.DatasetIamPolicy
|
224
|
-
|
225
|
-
```python
|
226
|
-
import pulumi
|
227
|
-
import pulumi_gcp as gcp
|
228
|
-
|
229
|
-
owner = gcp.organizations.get_iam_policy(bindings=[{
|
230
|
-
"role": "roles/bigquery.dataOwner",
|
231
|
-
"members": ["user:jane@example.com"],
|
232
|
-
}])
|
233
|
-
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
234
|
-
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
235
|
-
dataset_id=dataset_dataset.dataset_id,
|
236
|
-
policy_data=owner.policy_data)
|
237
|
-
```
|
238
|
-
|
239
223
|
## bigquery.DatasetIamBinding
|
240
224
|
|
241
225
|
```python
|
@@ -363,22 +347,6 @@ class DatasetIamPolicy(pulumi.CustomResource):
|
|
363
347
|
member="user:jane@example.com")
|
364
348
|
```
|
365
349
|
|
366
|
-
## bigquery.DatasetIamPolicy
|
367
|
-
|
368
|
-
```python
|
369
|
-
import pulumi
|
370
|
-
import pulumi_gcp as gcp
|
371
|
-
|
372
|
-
owner = gcp.organizations.get_iam_policy(bindings=[{
|
373
|
-
"role": "roles/bigquery.dataOwner",
|
374
|
-
"members": ["user:jane@example.com"],
|
375
|
-
}])
|
376
|
-
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
377
|
-
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
378
|
-
dataset_id=dataset_dataset.dataset_id,
|
379
|
-
policy_data=owner.policy_data)
|
380
|
-
```
|
381
|
-
|
382
350
|
## bigquery.DatasetIamBinding
|
383
351
|
|
384
352
|
```python
|
@@ -410,6 +410,27 @@ class IamBinding(pulumi.CustomResource):
|
|
410
410
|
})
|
411
411
|
```
|
412
412
|
|
413
|
+
## This resource supports User Project Overrides.
|
414
|
+
|
415
|
+
-
|
416
|
+
|
417
|
+
# IAM policy for BigQuery Table
|
418
|
+
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
419
|
+
|
420
|
+
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
421
|
+
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
422
|
+
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
423
|
+
|
424
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
425
|
+
|
426
|
+
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
427
|
+
|
428
|
+
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
429
|
+
|
430
|
+
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
431
|
+
|
432
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
433
|
+
|
413
434
|
## bigquery.IamPolicy
|
414
435
|
|
415
436
|
```python
|
@@ -698,6 +719,27 @@ class IamBinding(pulumi.CustomResource):
|
|
698
719
|
})
|
699
720
|
```
|
700
721
|
|
722
|
+
## This resource supports User Project Overrides.
|
723
|
+
|
724
|
+
-
|
725
|
+
|
726
|
+
# IAM policy for BigQuery Table
|
727
|
+
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
728
|
+
|
729
|
+
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
730
|
+
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
731
|
+
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
732
|
+
|
733
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
734
|
+
|
735
|
+
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
736
|
+
|
737
|
+
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
738
|
+
|
739
|
+
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
740
|
+
|
741
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
742
|
+
|
701
743
|
## bigquery.IamPolicy
|
702
744
|
|
703
745
|
```python
|
@@ -410,6 +410,27 @@ class IamMember(pulumi.CustomResource):
|
|
410
410
|
})
|
411
411
|
```
|
412
412
|
|
413
|
+
## This resource supports User Project Overrides.
|
414
|
+
|
415
|
+
-
|
416
|
+
|
417
|
+
# IAM policy for BigQuery Table
|
418
|
+
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
419
|
+
|
420
|
+
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
421
|
+
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
422
|
+
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
423
|
+
|
424
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
425
|
+
|
426
|
+
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
427
|
+
|
428
|
+
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
429
|
+
|
430
|
+
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
431
|
+
|
432
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
433
|
+
|
413
434
|
## bigquery.IamPolicy
|
414
435
|
|
415
436
|
```python
|
@@ -698,6 +719,27 @@ class IamMember(pulumi.CustomResource):
|
|
698
719
|
})
|
699
720
|
```
|
700
721
|
|
722
|
+
## This resource supports User Project Overrides.
|
723
|
+
|
724
|
+
-
|
725
|
+
|
726
|
+
# IAM policy for BigQuery Table
|
727
|
+
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
728
|
+
|
729
|
+
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
730
|
+
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
731
|
+
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
732
|
+
|
733
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
734
|
+
|
735
|
+
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
736
|
+
|
737
|
+
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
738
|
+
|
739
|
+
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
740
|
+
|
741
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
742
|
+
|
701
743
|
## bigquery.IamPolicy
|
702
744
|
|
703
745
|
```python
|
@@ -295,6 +295,27 @@ class IamPolicy(pulumi.CustomResource):
|
|
295
295
|
})
|
296
296
|
```
|
297
297
|
|
298
|
+
## This resource supports User Project Overrides.
|
299
|
+
|
300
|
+
-
|
301
|
+
|
302
|
+
# IAM policy for BigQuery Table
|
303
|
+
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
304
|
+
|
305
|
+
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
306
|
+
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
307
|
+
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
308
|
+
|
309
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
310
|
+
|
311
|
+
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
312
|
+
|
313
|
+
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
314
|
+
|
315
|
+
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
316
|
+
|
317
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
318
|
+
|
298
319
|
## bigquery.IamPolicy
|
299
320
|
|
300
321
|
```python
|
@@ -569,6 +590,27 @@ class IamPolicy(pulumi.CustomResource):
|
|
569
590
|
})
|
570
591
|
```
|
571
592
|
|
593
|
+
## This resource supports User Project Overrides.
|
594
|
+
|
595
|
+
-
|
596
|
+
|
597
|
+
# IAM policy for BigQuery Table
|
598
|
+
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
599
|
+
|
600
|
+
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
601
|
+
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
602
|
+
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
603
|
+
|
604
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
605
|
+
|
606
|
+
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
607
|
+
|
608
|
+
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
609
|
+
|
610
|
+
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
611
|
+
|
612
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
613
|
+
|
572
614
|
## bigquery.IamPolicy
|
573
615
|
|
574
616
|
```python
|
@@ -367,6 +367,25 @@ class DataExchangeIamBinding(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
+
## This resource supports User Project Overrides.
|
371
|
+
|
372
|
+
-
|
373
|
+
|
374
|
+
# IAM policy for Bigquery Analytics Hub DataExchange
|
375
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
376
|
+
|
377
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
378
|
+
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
379
|
+
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
380
|
+
|
381
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
+
|
383
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
384
|
+
|
385
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
386
|
+
|
387
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
+
|
370
389
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
371
390
|
|
372
391
|
```python
|
@@ -540,6 +559,25 @@ class DataExchangeIamBinding(pulumi.CustomResource):
|
|
540
559
|
member="user:jane@example.com")
|
541
560
|
```
|
542
561
|
|
562
|
+
## This resource supports User Project Overrides.
|
563
|
+
|
564
|
+
-
|
565
|
+
|
566
|
+
# IAM policy for Bigquery Analytics Hub DataExchange
|
567
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
568
|
+
|
569
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
570
|
+
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
571
|
+
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
572
|
+
|
573
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
+
|
575
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
576
|
+
|
577
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
578
|
+
|
579
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
+
|
543
581
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
544
582
|
|
545
583
|
```python
|
@@ -367,6 +367,25 @@ class DataExchangeIamMember(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
+
## This resource supports User Project Overrides.
|
371
|
+
|
372
|
+
-
|
373
|
+
|
374
|
+
# IAM policy for Bigquery Analytics Hub DataExchange
|
375
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
376
|
+
|
377
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
378
|
+
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
379
|
+
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
380
|
+
|
381
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
+
|
383
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
384
|
+
|
385
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
386
|
+
|
387
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
+
|
370
389
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
371
390
|
|
372
391
|
```python
|
@@ -540,6 +559,25 @@ class DataExchangeIamMember(pulumi.CustomResource):
|
|
540
559
|
member="user:jane@example.com")
|
541
560
|
```
|
542
561
|
|
562
|
+
## This resource supports User Project Overrides.
|
563
|
+
|
564
|
+
-
|
565
|
+
|
566
|
+
# IAM policy for Bigquery Analytics Hub DataExchange
|
567
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
568
|
+
|
569
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
570
|
+
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
571
|
+
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
572
|
+
|
573
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
+
|
575
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
576
|
+
|
577
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
578
|
+
|
579
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
+
|
543
581
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
544
582
|
|
545
583
|
```python
|
@@ -264,6 +264,25 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
|
|
264
264
|
member="user:jane@example.com")
|
265
265
|
```
|
266
266
|
|
267
|
+
## This resource supports User Project Overrides.
|
268
|
+
|
269
|
+
-
|
270
|
+
|
271
|
+
# IAM policy for Bigquery Analytics Hub DataExchange
|
272
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
273
|
+
|
274
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
275
|
+
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
276
|
+
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
277
|
+
|
278
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
279
|
+
|
280
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
281
|
+
|
282
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
283
|
+
|
284
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
285
|
+
|
267
286
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
268
287
|
|
269
288
|
```python
|
@@ -425,6 +444,25 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
|
|
425
444
|
member="user:jane@example.com")
|
426
445
|
```
|
427
446
|
|
447
|
+
## This resource supports User Project Overrides.
|
448
|
+
|
449
|
+
-
|
450
|
+
|
451
|
+
# IAM policy for Bigquery Analytics Hub DataExchange
|
452
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
453
|
+
|
454
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
455
|
+
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
456
|
+
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
457
|
+
|
458
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
459
|
+
|
460
|
+
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
461
|
+
|
462
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
463
|
+
|
464
|
+
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
465
|
+
|
428
466
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
429
467
|
|
430
468
|
```python
|
@@ -402,6 +402,25 @@ class ListingIamBinding(pulumi.CustomResource):
|
|
402
402
|
member="user:jane@example.com")
|
403
403
|
```
|
404
404
|
|
405
|
+
## This resource supports User Project Overrides.
|
406
|
+
|
407
|
+
-
|
408
|
+
|
409
|
+
# IAM policy for Bigquery Analytics Hub Listing
|
410
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
411
|
+
|
412
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
413
|
+
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
414
|
+
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
415
|
+
|
416
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
+
|
418
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
419
|
+
|
420
|
+
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
421
|
+
|
422
|
+
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
+
|
405
424
|
## bigqueryanalyticshub.ListingIamPolicy
|
406
425
|
|
407
426
|
```python
|
@@ -582,6 +601,25 @@ class ListingIamBinding(pulumi.CustomResource):
|
|
582
601
|
member="user:jane@example.com")
|
583
602
|
```
|
584
603
|
|
604
|
+
## This resource supports User Project Overrides.
|
605
|
+
|
606
|
+
-
|
607
|
+
|
608
|
+
# IAM policy for Bigquery Analytics Hub Listing
|
609
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
610
|
+
|
611
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
612
|
+
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
613
|
+
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
614
|
+
|
615
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
616
|
+
|
617
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
618
|
+
|
619
|
+
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
620
|
+
|
621
|
+
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
622
|
+
|
585
623
|
## bigqueryanalyticshub.ListingIamPolicy
|
586
624
|
|
587
625
|
```python
|