pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -402,6 +402,25 @@ class ListingIamMember(pulumi.CustomResource):
|
|
402
402
|
member="user:jane@example.com")
|
403
403
|
```
|
404
404
|
|
405
|
+
## This resource supports User Project Overrides.
|
406
|
+
|
407
|
+
-
|
408
|
+
|
409
|
+
# IAM policy for Bigquery Analytics Hub Listing
|
410
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
411
|
+
|
412
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
413
|
+
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
414
|
+
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
415
|
+
|
416
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
+
|
418
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
419
|
+
|
420
|
+
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
421
|
+
|
422
|
+
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
+
|
405
424
|
## bigqueryanalyticshub.ListingIamPolicy
|
406
425
|
|
407
426
|
```python
|
@@ -582,6 +601,25 @@ class ListingIamMember(pulumi.CustomResource):
|
|
582
601
|
member="user:jane@example.com")
|
583
602
|
```
|
584
603
|
|
604
|
+
## This resource supports User Project Overrides.
|
605
|
+
|
606
|
+
-
|
607
|
+
|
608
|
+
# IAM policy for Bigquery Analytics Hub Listing
|
609
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
610
|
+
|
611
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
612
|
+
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
613
|
+
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
614
|
+
|
615
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
616
|
+
|
617
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
618
|
+
|
619
|
+
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
620
|
+
|
621
|
+
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
622
|
+
|
585
623
|
## bigqueryanalyticshub.ListingIamPolicy
|
586
624
|
|
587
625
|
```python
|
@@ -299,6 +299,25 @@ class ListingIamPolicy(pulumi.CustomResource):
|
|
299
299
|
member="user:jane@example.com")
|
300
300
|
```
|
301
301
|
|
302
|
+
## This resource supports User Project Overrides.
|
303
|
+
|
304
|
+
-
|
305
|
+
|
306
|
+
# IAM policy for Bigquery Analytics Hub Listing
|
307
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
308
|
+
|
309
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
310
|
+
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
311
|
+
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
312
|
+
|
313
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
314
|
+
|
315
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
316
|
+
|
317
|
+
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
318
|
+
|
319
|
+
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
320
|
+
|
302
321
|
## bigqueryanalyticshub.ListingIamPolicy
|
303
322
|
|
304
323
|
```python
|
@@ -467,6 +486,25 @@ class ListingIamPolicy(pulumi.CustomResource):
|
|
467
486
|
member="user:jane@example.com")
|
468
487
|
```
|
469
488
|
|
489
|
+
## This resource supports User Project Overrides.
|
490
|
+
|
491
|
+
-
|
492
|
+
|
493
|
+
# IAM policy for Bigquery Analytics Hub Listing
|
494
|
+
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
495
|
+
|
496
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
497
|
+
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
498
|
+
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
499
|
+
|
500
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
501
|
+
|
502
|
+
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
503
|
+
|
504
|
+
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
505
|
+
|
506
|
+
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
507
|
+
|
470
508
|
## bigqueryanalyticshub.ListingIamPolicy
|
471
509
|
|
472
510
|
```python
|
@@ -359,6 +359,25 @@ class DataPolicyIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for BigQuery Data Policy DataPolicy
|
367
|
+
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
370
|
+
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
371
|
+
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
376
|
+
|
377
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class DataPolicyIamBinding(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for BigQuery Data Policy DataPolicy
|
558
|
+
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
561
|
+
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
562
|
+
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
567
|
+
|
568
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -359,6 +359,25 @@ class DataPolicyIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for BigQuery Data Policy DataPolicy
|
367
|
+
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
370
|
+
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
371
|
+
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
376
|
+
|
377
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class DataPolicyIamMember(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for BigQuery Data Policy DataPolicy
|
558
|
+
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
561
|
+
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
562
|
+
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
567
|
+
|
568
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -256,6 +256,25 @@ class DataPolicyIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for BigQuery Data Policy DataPolicy
|
264
|
+
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
267
|
+
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
268
|
+
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
273
|
+
|
274
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class DataPolicyIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for BigQuery Data Policy DataPolicy
|
443
|
+
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
446
|
+
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
447
|
+
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
452
|
+
|
453
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
420
458
|
|
421
459
|
```python
|
@@ -319,6 +319,25 @@ class AttestorIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Binary Authorization Attestor
|
327
|
+
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
330
|
+
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
331
|
+
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
336
|
+
|
337
|
+
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## binaryauthorization.AttestorIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class AttestorIamBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Binary Authorization Attestor
|
507
|
+
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
510
|
+
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
511
|
+
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
516
|
+
|
517
|
+
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## binaryauthorization.AttestorIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class AttestorIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Binary Authorization Attestor
|
327
|
+
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
330
|
+
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
331
|
+
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
336
|
+
|
337
|
+
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## binaryauthorization.AttestorIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class AttestorIamMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Binary Authorization Attestor
|
507
|
+
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
510
|
+
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
511
|
+
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
516
|
+
|
517
|
+
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## binaryauthorization.AttestorIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class AttestorIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Binary Authorization Attestor
|
224
|
+
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
227
|
+
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
228
|
+
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
233
|
+
|
234
|
+
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## binaryauthorization.AttestorIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class AttestorIamPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Binary Authorization Attestor
|
392
|
+
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
395
|
+
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
396
|
+
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
401
|
+
|
402
|
+
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## binaryauthorization.AttestorIamPolicy
|
369
407
|
|
370
408
|
```python
|
@@ -431,6 +431,27 @@ class CaPoolIamBinding(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
+
## This resource supports User Project Overrides.
|
435
|
+
|
436
|
+
-
|
437
|
+
|
438
|
+
# IAM policy for Certificate Authority Service CaPool
|
439
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
440
|
+
|
441
|
+
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
442
|
+
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
443
|
+
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
444
|
+
|
445
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
+
|
447
|
+
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
448
|
+
|
449
|
+
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
450
|
+
|
451
|
+
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
+
|
453
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
+
|
434
455
|
## certificateauthority.CaPoolIamPolicy
|
435
456
|
|
436
457
|
```python
|
@@ -699,6 +720,27 @@ class CaPoolIamBinding(pulumi.CustomResource):
|
|
699
720
|
})
|
700
721
|
```
|
701
722
|
|
723
|
+
## This resource supports User Project Overrides.
|
724
|
+
|
725
|
+
-
|
726
|
+
|
727
|
+
# IAM policy for Certificate Authority Service CaPool
|
728
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
729
|
+
|
730
|
+
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
731
|
+
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
732
|
+
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
733
|
+
|
734
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
735
|
+
|
736
|
+
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
737
|
+
|
738
|
+
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
739
|
+
|
740
|
+
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
741
|
+
|
742
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
743
|
+
|
702
744
|
## certificateauthority.CaPoolIamPolicy
|
703
745
|
|
704
746
|
```python
|
@@ -431,6 +431,27 @@ class CaPoolIamMember(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
+
## This resource supports User Project Overrides.
|
435
|
+
|
436
|
+
-
|
437
|
+
|
438
|
+
# IAM policy for Certificate Authority Service CaPool
|
439
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
440
|
+
|
441
|
+
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
442
|
+
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
443
|
+
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
444
|
+
|
445
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
+
|
447
|
+
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
448
|
+
|
449
|
+
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
450
|
+
|
451
|
+
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
+
|
453
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
+
|
434
455
|
## certificateauthority.CaPoolIamPolicy
|
435
456
|
|
436
457
|
```python
|
@@ -699,6 +720,27 @@ class CaPoolIamMember(pulumi.CustomResource):
|
|
699
720
|
})
|
700
721
|
```
|
701
722
|
|
723
|
+
## This resource supports User Project Overrides.
|
724
|
+
|
725
|
+
-
|
726
|
+
|
727
|
+
# IAM policy for Certificate Authority Service CaPool
|
728
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
729
|
+
|
730
|
+
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
731
|
+
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
732
|
+
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
733
|
+
|
734
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
735
|
+
|
736
|
+
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
737
|
+
|
738
|
+
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
739
|
+
|
740
|
+
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
741
|
+
|
742
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
743
|
+
|
702
744
|
## certificateauthority.CaPoolIamPolicy
|
703
745
|
|
704
746
|
```python
|
@@ -316,6 +316,27 @@ class CaPoolIamPolicy(pulumi.CustomResource):
|
|
316
316
|
})
|
317
317
|
```
|
318
318
|
|
319
|
+
## This resource supports User Project Overrides.
|
320
|
+
|
321
|
+
-
|
322
|
+
|
323
|
+
# IAM policy for Certificate Authority Service CaPool
|
324
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
325
|
+
|
326
|
+
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
327
|
+
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
328
|
+
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
329
|
+
|
330
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
331
|
+
|
332
|
+
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
333
|
+
|
334
|
+
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
335
|
+
|
336
|
+
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
337
|
+
|
338
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
339
|
+
|
319
340
|
## certificateauthority.CaPoolIamPolicy
|
320
341
|
|
321
342
|
```python
|
@@ -570,6 +591,27 @@ class CaPoolIamPolicy(pulumi.CustomResource):
|
|
570
591
|
})
|
571
592
|
```
|
572
593
|
|
594
|
+
## This resource supports User Project Overrides.
|
595
|
+
|
596
|
+
-
|
597
|
+
|
598
|
+
# IAM policy for Certificate Authority Service CaPool
|
599
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
600
|
+
|
601
|
+
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
602
|
+
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
603
|
+
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
604
|
+
|
605
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
606
|
+
|
607
|
+
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
608
|
+
|
609
|
+
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
610
|
+
|
611
|
+
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
612
|
+
|
613
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
614
|
+
|
573
615
|
## certificateauthority.CaPoolIamPolicy
|
574
616
|
|
575
617
|
```python
|