pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/accesscontextmanager/outputs.py +8 -2
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/data_transfer_config.py +52 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/_inputs.py +24 -24
- pulumi_gcp/compute/disk.py +75 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/get_disk.py +11 -1
- pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
- pulumi_gcp/compute/get_instance_template.py +2 -2
- pulumi_gcp/compute/get_region_instance_template.py +2 -2
- pulumi_gcp/compute/get_snapshot.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/outputs.py +24 -24
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/firebase/project.py +10 -2
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_handle.py +7 -7
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/migrationcenter/_inputs.py +21 -129
- pulumi_gcp/migrationcenter/outputs.py +14 -86
- pulumi_gcp/networkconnectivity/hub.py +69 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/organizations/project.py +16 -7
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/sql/_inputs.py +35 -15
- pulumi_gcp/sql/outputs.py +50 -14
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -423,6 +423,27 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
|
|
423
423
|
})
|
424
424
|
```
|
425
425
|
|
426
|
+
## This resource supports User Project Overrides.
|
427
|
+
|
428
|
+
-
|
429
|
+
|
430
|
+
# IAM policy for Certificate Authority Service CertificateTemplate
|
431
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
432
|
+
|
433
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
434
|
+
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
435
|
+
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
436
|
+
|
437
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
438
|
+
|
439
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
440
|
+
|
441
|
+
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
442
|
+
|
443
|
+
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
444
|
+
|
445
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
446
|
+
|
426
447
|
## certificateauthority.CertificateTemplateIamPolicy
|
427
448
|
|
428
449
|
```python
|
@@ -689,6 +710,27 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
|
|
689
710
|
})
|
690
711
|
```
|
691
712
|
|
713
|
+
## This resource supports User Project Overrides.
|
714
|
+
|
715
|
+
-
|
716
|
+
|
717
|
+
# IAM policy for Certificate Authority Service CertificateTemplate
|
718
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
719
|
+
|
720
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
721
|
+
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
722
|
+
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
723
|
+
|
724
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
725
|
+
|
726
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
727
|
+
|
728
|
+
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
729
|
+
|
730
|
+
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
731
|
+
|
732
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
733
|
+
|
692
734
|
## certificateauthority.CertificateTemplateIamPolicy
|
693
735
|
|
694
736
|
```python
|
@@ -423,6 +423,27 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
|
|
423
423
|
})
|
424
424
|
```
|
425
425
|
|
426
|
+
## This resource supports User Project Overrides.
|
427
|
+
|
428
|
+
-
|
429
|
+
|
430
|
+
# IAM policy for Certificate Authority Service CertificateTemplate
|
431
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
432
|
+
|
433
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
434
|
+
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
435
|
+
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
436
|
+
|
437
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
438
|
+
|
439
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
440
|
+
|
441
|
+
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
442
|
+
|
443
|
+
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
444
|
+
|
445
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
446
|
+
|
426
447
|
## certificateauthority.CertificateTemplateIamPolicy
|
427
448
|
|
428
449
|
```python
|
@@ -689,6 +710,27 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
|
|
689
710
|
})
|
690
711
|
```
|
691
712
|
|
713
|
+
## This resource supports User Project Overrides.
|
714
|
+
|
715
|
+
-
|
716
|
+
|
717
|
+
# IAM policy for Certificate Authority Service CertificateTemplate
|
718
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
719
|
+
|
720
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
721
|
+
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
722
|
+
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
723
|
+
|
724
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
725
|
+
|
726
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
727
|
+
|
728
|
+
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
729
|
+
|
730
|
+
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
731
|
+
|
732
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
733
|
+
|
692
734
|
## certificateauthority.CertificateTemplateIamPolicy
|
693
735
|
|
694
736
|
```python
|
@@ -308,6 +308,27 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
|
|
308
308
|
})
|
309
309
|
```
|
310
310
|
|
311
|
+
## This resource supports User Project Overrides.
|
312
|
+
|
313
|
+
-
|
314
|
+
|
315
|
+
# IAM policy for Certificate Authority Service CertificateTemplate
|
316
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
317
|
+
|
318
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
319
|
+
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
320
|
+
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
321
|
+
|
322
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
323
|
+
|
324
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
325
|
+
|
326
|
+
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
327
|
+
|
328
|
+
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
329
|
+
|
330
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
331
|
+
|
311
332
|
## certificateauthority.CertificateTemplateIamPolicy
|
312
333
|
|
313
334
|
```python
|
@@ -560,6 +581,27 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
|
|
560
581
|
})
|
561
582
|
```
|
562
583
|
|
584
|
+
## This resource supports User Project Overrides.
|
585
|
+
|
586
|
+
-
|
587
|
+
|
588
|
+
# IAM policy for Certificate Authority Service CertificateTemplate
|
589
|
+
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
590
|
+
|
591
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
592
|
+
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
593
|
+
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
594
|
+
|
595
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
596
|
+
|
597
|
+
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
598
|
+
|
599
|
+
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
600
|
+
|
601
|
+
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
602
|
+
|
603
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
604
|
+
|
563
605
|
## certificateauthority.CertificateTemplateIamPolicy
|
564
606
|
|
565
607
|
```python
|
@@ -364,6 +364,25 @@ class ConnectionIAMBinding(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
+
## This resource supports User Project Overrides.
|
368
|
+
|
369
|
+
-
|
370
|
+
|
371
|
+
# IAM policy for Cloud Build v2 Connection
|
372
|
+
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
373
|
+
|
374
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
375
|
+
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
376
|
+
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
377
|
+
|
378
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
+
|
380
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
381
|
+
|
382
|
+
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
383
|
+
|
384
|
+
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
385
|
+
|
367
386
|
## cloudbuildv2.ConnectionIAMPolicy
|
368
387
|
|
369
388
|
```python
|
@@ -536,6 +555,25 @@ class ConnectionIAMBinding(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Cloud Build v2 Connection
|
563
|
+
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
566
|
+
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
567
|
+
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
572
|
+
|
573
|
+
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## cloudbuildv2.ConnectionIAMPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -364,6 +364,25 @@ class ConnectionIAMMember(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
+
## This resource supports User Project Overrides.
|
368
|
+
|
369
|
+
-
|
370
|
+
|
371
|
+
# IAM policy for Cloud Build v2 Connection
|
372
|
+
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
373
|
+
|
374
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
375
|
+
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
376
|
+
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
377
|
+
|
378
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
+
|
380
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
381
|
+
|
382
|
+
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
383
|
+
|
384
|
+
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
385
|
+
|
367
386
|
## cloudbuildv2.ConnectionIAMPolicy
|
368
387
|
|
369
388
|
```python
|
@@ -536,6 +555,25 @@ class ConnectionIAMMember(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Cloud Build v2 Connection
|
563
|
+
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
566
|
+
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
567
|
+
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
572
|
+
|
573
|
+
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## cloudbuildv2.ConnectionIAMPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -261,6 +261,25 @@ class ConnectionIAMPolicy(pulumi.CustomResource):
|
|
261
261
|
member="user:jane@example.com")
|
262
262
|
```
|
263
263
|
|
264
|
+
## This resource supports User Project Overrides.
|
265
|
+
|
266
|
+
-
|
267
|
+
|
268
|
+
# IAM policy for Cloud Build v2 Connection
|
269
|
+
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
270
|
+
|
271
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
272
|
+
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
273
|
+
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
274
|
+
|
275
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
276
|
+
|
277
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
278
|
+
|
279
|
+
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
280
|
+
|
281
|
+
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
282
|
+
|
264
283
|
## cloudbuildv2.ConnectionIAMPolicy
|
265
284
|
|
266
285
|
```python
|
@@ -421,6 +440,25 @@ class ConnectionIAMPolicy(pulumi.CustomResource):
|
|
421
440
|
member="user:jane@example.com")
|
422
441
|
```
|
423
442
|
|
443
|
+
## This resource supports User Project Overrides.
|
444
|
+
|
445
|
+
-
|
446
|
+
|
447
|
+
# IAM policy for Cloud Build v2 Connection
|
448
|
+
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
449
|
+
|
450
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
451
|
+
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
452
|
+
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
453
|
+
|
454
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
+
|
456
|
+
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
457
|
+
|
458
|
+
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
459
|
+
|
460
|
+
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
461
|
+
|
424
462
|
## cloudbuildv2.ConnectionIAMPolicy
|
425
463
|
|
426
464
|
```python
|
@@ -363,6 +363,25 @@ class FunctionIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud Functions CloudFunction
|
371
|
+
Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
|
374
|
+
* `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
|
375
|
+
* `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
|
380
|
+
|
381
|
+
> **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## cloudfunctions.FunctionIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class FunctionIamBinding(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud Functions CloudFunction
|
562
|
+
Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
|
565
|
+
* `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
|
566
|
+
* `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
|
571
|
+
|
572
|
+
> **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## cloudfunctions.FunctionIamPolicy
|
539
577
|
|
540
578
|
```python
|
@@ -363,6 +363,25 @@ class FunctionIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud Functions CloudFunction
|
371
|
+
Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
|
374
|
+
* `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
|
375
|
+
* `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
|
380
|
+
|
381
|
+
> **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## cloudfunctions.FunctionIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class FunctionIamMember(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud Functions CloudFunction
|
562
|
+
Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
|
565
|
+
* `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
|
566
|
+
* `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
|
571
|
+
|
572
|
+
> **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## cloudfunctions.FunctionIamPolicy
|
539
577
|
|
540
578
|
```python
|
@@ -260,6 +260,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
+
## This resource supports User Project Overrides.
|
264
|
+
|
265
|
+
-
|
266
|
+
|
267
|
+
# IAM policy for Cloud Functions CloudFunction
|
268
|
+
Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
|
271
|
+
* `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
|
272
|
+
* `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
|
277
|
+
|
278
|
+
> **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
263
282
|
## cloudfunctions.FunctionIamPolicy
|
264
283
|
|
265
284
|
```python
|
@@ -420,6 +439,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
|
|
420
439
|
member="user:jane@example.com")
|
421
440
|
```
|
422
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Cloud Functions CloudFunction
|
447
|
+
Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
|
450
|
+
* `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
|
451
|
+
* `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
|
456
|
+
|
457
|
+
> **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
423
461
|
## cloudfunctions.FunctionIamPolicy
|
424
462
|
|
425
463
|
```python
|
@@ -363,6 +363,25 @@ class FunctionIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud Functions (2nd gen) function
|
371
|
+
Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
|
374
|
+
* `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
|
375
|
+
* `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
|
380
|
+
|
381
|
+
> **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## cloudfunctionsv2.FunctionIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class FunctionIamBinding(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud Functions (2nd gen) function
|
562
|
+
Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
|
565
|
+
* `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
|
566
|
+
* `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
|
571
|
+
|
572
|
+
> **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## cloudfunctionsv2.FunctionIamPolicy
|
539
577
|
|
540
578
|
```python
|
@@ -363,6 +363,25 @@ class FunctionIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud Functions (2nd gen) function
|
371
|
+
Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
|
374
|
+
* `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
|
375
|
+
* `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
|
380
|
+
|
381
|
+
> **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## cloudfunctionsv2.FunctionIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class FunctionIamMember(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud Functions (2nd gen) function
|
562
|
+
Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
|
565
|
+
* `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
|
566
|
+
* `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
|
571
|
+
|
572
|
+
> **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## cloudfunctionsv2.FunctionIamPolicy
|
539
577
|
|
540
578
|
```python
|
@@ -260,6 +260,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
+
## This resource supports User Project Overrides.
|
264
|
+
|
265
|
+
-
|
266
|
+
|
267
|
+
# IAM policy for Cloud Functions (2nd gen) function
|
268
|
+
Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
|
271
|
+
* `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
|
272
|
+
* `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
|
277
|
+
|
278
|
+
> **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
263
282
|
## cloudfunctionsv2.FunctionIamPolicy
|
264
283
|
|
265
284
|
```python
|
@@ -420,6 +439,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
|
|
420
439
|
member="user:jane@example.com")
|
421
440
|
```
|
422
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Cloud Functions (2nd gen) function
|
447
|
+
Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
|
450
|
+
* `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
|
451
|
+
* `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
|
456
|
+
|
457
|
+
> **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
423
461
|
## cloudfunctionsv2.FunctionIamPolicy
|
424
462
|
|
425
463
|
```python
|