pulumi-gcp 7.35.0a1722940030__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -288,49 +288,6 @@ class IamAuditConfig(pulumi.CustomResource):
|
|
288
288
|
])
|
289
289
|
```
|
290
290
|
|
291
|
-
## folder.IAMPolicy
|
292
|
-
|
293
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
294
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
295
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
296
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
297
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
298
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
299
|
-
applying the change.
|
300
|
-
|
301
|
-
```python
|
302
|
-
import pulumi
|
303
|
-
import pulumi_gcp as gcp
|
304
|
-
|
305
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
306
|
-
"role": "roles/editor",
|
307
|
-
"members": ["user:jane@example.com"],
|
308
|
-
}])
|
309
|
-
folder = gcp.folder.IAMPolicy("folder",
|
310
|
-
folder="folders/1234567",
|
311
|
-
policy_data=admin.policy_data)
|
312
|
-
```
|
313
|
-
|
314
|
-
With IAM Conditions:
|
315
|
-
|
316
|
-
```python
|
317
|
-
import pulumi
|
318
|
-
import pulumi_gcp as gcp
|
319
|
-
|
320
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
321
|
-
"role": "roles/compute.admin",
|
322
|
-
"members": ["user:jane@example.com"],
|
323
|
-
"condition": {
|
324
|
-
"title": "expires_after_2019_12_31",
|
325
|
-
"description": "Expiring at midnight of 2019-12-31",
|
326
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
327
|
-
},
|
328
|
-
}])
|
329
|
-
folder = gcp.folder.IAMPolicy("folder",
|
330
|
-
folder="folders/1234567",
|
331
|
-
policy_data=admin.policy_data)
|
332
|
-
```
|
333
|
-
|
334
291
|
## folder.IAMBinding
|
335
292
|
|
336
293
|
```python
|
@@ -583,49 +540,6 @@ class IamAuditConfig(pulumi.CustomResource):
|
|
583
540
|
])
|
584
541
|
```
|
585
542
|
|
586
|
-
## folder.IAMPolicy
|
587
|
-
|
588
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
589
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
590
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
591
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
592
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
593
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
594
|
-
applying the change.
|
595
|
-
|
596
|
-
```python
|
597
|
-
import pulumi
|
598
|
-
import pulumi_gcp as gcp
|
599
|
-
|
600
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
601
|
-
"role": "roles/editor",
|
602
|
-
"members": ["user:jane@example.com"],
|
603
|
-
}])
|
604
|
-
folder = gcp.folder.IAMPolicy("folder",
|
605
|
-
folder="folders/1234567",
|
606
|
-
policy_data=admin.policy_data)
|
607
|
-
```
|
608
|
-
|
609
|
-
With IAM Conditions:
|
610
|
-
|
611
|
-
```python
|
612
|
-
import pulumi
|
613
|
-
import pulumi_gcp as gcp
|
614
|
-
|
615
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
616
|
-
"role": "roles/compute.admin",
|
617
|
-
"members": ["user:jane@example.com"],
|
618
|
-
"condition": {
|
619
|
-
"title": "expires_after_2019_12_31",
|
620
|
-
"description": "Expiring at midnight of 2019-12-31",
|
621
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
622
|
-
},
|
623
|
-
}])
|
624
|
-
folder = gcp.folder.IAMPolicy("folder",
|
625
|
-
folder="folders/1234567",
|
626
|
-
policy_data=admin.policy_data)
|
627
|
-
```
|
628
|
-
|
629
543
|
## folder.IAMBinding
|
630
544
|
|
631
545
|
```python
|
pulumi_gcp/folder/iam_member.py
CHANGED
@@ -353,49 +353,6 @@ class IAMMember(pulumi.CustomResource):
|
|
353
353
|
])
|
354
354
|
```
|
355
355
|
|
356
|
-
## folder.IAMPolicy
|
357
|
-
|
358
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
359
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
360
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
361
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
362
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
363
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
364
|
-
applying the change.
|
365
|
-
|
366
|
-
```python
|
367
|
-
import pulumi
|
368
|
-
import pulumi_gcp as gcp
|
369
|
-
|
370
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
371
|
-
"role": "roles/editor",
|
372
|
-
"members": ["user:jane@example.com"],
|
373
|
-
}])
|
374
|
-
folder = gcp.folder.IAMPolicy("folder",
|
375
|
-
folder="folders/1234567",
|
376
|
-
policy_data=admin.policy_data)
|
377
|
-
```
|
378
|
-
|
379
|
-
With IAM Conditions:
|
380
|
-
|
381
|
-
```python
|
382
|
-
import pulumi
|
383
|
-
import pulumi_gcp as gcp
|
384
|
-
|
385
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
386
|
-
"role": "roles/compute.admin",
|
387
|
-
"members": ["user:jane@example.com"],
|
388
|
-
"condition": {
|
389
|
-
"title": "expires_after_2019_12_31",
|
390
|
-
"description": "Expiring at midnight of 2019-12-31",
|
391
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
392
|
-
},
|
393
|
-
}])
|
394
|
-
folder = gcp.folder.IAMPolicy("folder",
|
395
|
-
folder="folders/1234567",
|
396
|
-
policy_data=admin.policy_data)
|
397
|
-
```
|
398
|
-
|
399
356
|
## folder.IAMBinding
|
400
357
|
|
401
358
|
```python
|
@@ -657,49 +614,6 @@ class IAMMember(pulumi.CustomResource):
|
|
657
614
|
])
|
658
615
|
```
|
659
616
|
|
660
|
-
## folder.IAMPolicy
|
661
|
-
|
662
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
663
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
664
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
665
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
666
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
667
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
668
|
-
applying the change.
|
669
|
-
|
670
|
-
```python
|
671
|
-
import pulumi
|
672
|
-
import pulumi_gcp as gcp
|
673
|
-
|
674
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
675
|
-
"role": "roles/editor",
|
676
|
-
"members": ["user:jane@example.com"],
|
677
|
-
}])
|
678
|
-
folder = gcp.folder.IAMPolicy("folder",
|
679
|
-
folder="folders/1234567",
|
680
|
-
policy_data=admin.policy_data)
|
681
|
-
```
|
682
|
-
|
683
|
-
With IAM Conditions:
|
684
|
-
|
685
|
-
```python
|
686
|
-
import pulumi
|
687
|
-
import pulumi_gcp as gcp
|
688
|
-
|
689
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
690
|
-
"role": "roles/compute.admin",
|
691
|
-
"members": ["user:jane@example.com"],
|
692
|
-
"condition": {
|
693
|
-
"title": "expires_after_2019_12_31",
|
694
|
-
"description": "Expiring at midnight of 2019-12-31",
|
695
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
696
|
-
},
|
697
|
-
}])
|
698
|
-
folder = gcp.folder.IAMPolicy("folder",
|
699
|
-
folder="folders/1234567",
|
700
|
-
policy_data=admin.policy_data)
|
701
|
-
```
|
702
|
-
|
703
617
|
## folder.IAMBinding
|
704
618
|
|
705
619
|
```python
|
pulumi_gcp/folder/iam_policy.py
CHANGED
@@ -282,49 +282,6 @@ class IAMPolicy(pulumi.CustomResource):
|
|
282
282
|
])
|
283
283
|
```
|
284
284
|
|
285
|
-
## folder.IAMPolicy
|
286
|
-
|
287
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
288
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
289
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
290
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
291
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
292
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
293
|
-
applying the change.
|
294
|
-
|
295
|
-
```python
|
296
|
-
import pulumi
|
297
|
-
import pulumi_gcp as gcp
|
298
|
-
|
299
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
300
|
-
"role": "roles/editor",
|
301
|
-
"members": ["user:jane@example.com"],
|
302
|
-
}])
|
303
|
-
folder = gcp.folder.IAMPolicy("folder",
|
304
|
-
folder="folders/1234567",
|
305
|
-
policy_data=admin.policy_data)
|
306
|
-
```
|
307
|
-
|
308
|
-
With IAM Conditions:
|
309
|
-
|
310
|
-
```python
|
311
|
-
import pulumi
|
312
|
-
import pulumi_gcp as gcp
|
313
|
-
|
314
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
315
|
-
"role": "roles/compute.admin",
|
316
|
-
"members": ["user:jane@example.com"],
|
317
|
-
"condition": {
|
318
|
-
"title": "expires_after_2019_12_31",
|
319
|
-
"description": "Expiring at midnight of 2019-12-31",
|
320
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
321
|
-
},
|
322
|
-
}])
|
323
|
-
folder = gcp.folder.IAMPolicy("folder",
|
324
|
-
folder="folders/1234567",
|
325
|
-
policy_data=admin.policy_data)
|
326
|
-
```
|
327
|
-
|
328
285
|
## folder.IAMBinding
|
329
286
|
|
330
287
|
```python
|
@@ -583,49 +540,6 @@ class IAMPolicy(pulumi.CustomResource):
|
|
583
540
|
])
|
584
541
|
```
|
585
542
|
|
586
|
-
## folder.IAMPolicy
|
587
|
-
|
588
|
-
!> **Be careful!** You can accidentally lock yourself out of your folder
|
589
|
-
using this resource. Deleting a `folder.IAMPolicy` removes access
|
590
|
-
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
591
|
-
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
592
|
-
to avoid locking yourself out, and it should generally only be used with folders
|
593
|
-
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
594
|
-
applying the change.
|
595
|
-
|
596
|
-
```python
|
597
|
-
import pulumi
|
598
|
-
import pulumi_gcp as gcp
|
599
|
-
|
600
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
601
|
-
"role": "roles/editor",
|
602
|
-
"members": ["user:jane@example.com"],
|
603
|
-
}])
|
604
|
-
folder = gcp.folder.IAMPolicy("folder",
|
605
|
-
folder="folders/1234567",
|
606
|
-
policy_data=admin.policy_data)
|
607
|
-
```
|
608
|
-
|
609
|
-
With IAM Conditions:
|
610
|
-
|
611
|
-
```python
|
612
|
-
import pulumi
|
613
|
-
import pulumi_gcp as gcp
|
614
|
-
|
615
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
616
|
-
"role": "roles/compute.admin",
|
617
|
-
"members": ["user:jane@example.com"],
|
618
|
-
"condition": {
|
619
|
-
"title": "expires_after_2019_12_31",
|
620
|
-
"description": "Expiring at midnight of 2019-12-31",
|
621
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
622
|
-
},
|
623
|
-
}])
|
624
|
-
folder = gcp.folder.IAMPolicy("folder",
|
625
|
-
folder="folders/1234567",
|
626
|
-
policy_data=admin.policy_data)
|
627
|
-
```
|
628
|
-
|
629
543
|
## folder.IAMBinding
|
630
544
|
|
631
545
|
```python
|
@@ -368,6 +368,25 @@ class BackupPlanIamBinding(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
+
## This resource supports User Project Overrides.
|
372
|
+
|
373
|
+
-
|
374
|
+
|
375
|
+
# IAM policy for Backup for GKE BackupPlan
|
376
|
+
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
377
|
+
|
378
|
+
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
379
|
+
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
380
|
+
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
381
|
+
|
382
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
+
|
384
|
+
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
385
|
+
|
386
|
+
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
387
|
+
|
388
|
+
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
+
|
371
390
|
## gkebackup.BackupPlanIamPolicy
|
372
391
|
|
373
392
|
```python
|
@@ -541,6 +560,25 @@ class BackupPlanIamBinding(pulumi.CustomResource):
|
|
541
560
|
member="user:jane@example.com")
|
542
561
|
```
|
543
562
|
|
563
|
+
## This resource supports User Project Overrides.
|
564
|
+
|
565
|
+
-
|
566
|
+
|
567
|
+
# IAM policy for Backup for GKE BackupPlan
|
568
|
+
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
569
|
+
|
570
|
+
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
571
|
+
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
572
|
+
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
573
|
+
|
574
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
+
|
576
|
+
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
577
|
+
|
578
|
+
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
579
|
+
|
580
|
+
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
+
|
544
582
|
## gkebackup.BackupPlanIamPolicy
|
545
583
|
|
546
584
|
```python
|
@@ -368,6 +368,25 @@ class BackupPlanIamMember(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
+
## This resource supports User Project Overrides.
|
372
|
+
|
373
|
+
-
|
374
|
+
|
375
|
+
# IAM policy for Backup for GKE BackupPlan
|
376
|
+
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
377
|
+
|
378
|
+
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
379
|
+
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
380
|
+
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
381
|
+
|
382
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
+
|
384
|
+
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
385
|
+
|
386
|
+
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
387
|
+
|
388
|
+
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
+
|
371
390
|
## gkebackup.BackupPlanIamPolicy
|
372
391
|
|
373
392
|
```python
|
@@ -541,6 +560,25 @@ class BackupPlanIamMember(pulumi.CustomResource):
|
|
541
560
|
member="user:jane@example.com")
|
542
561
|
```
|
543
562
|
|
563
|
+
## This resource supports User Project Overrides.
|
564
|
+
|
565
|
+
-
|
566
|
+
|
567
|
+
# IAM policy for Backup for GKE BackupPlan
|
568
|
+
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
569
|
+
|
570
|
+
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
571
|
+
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
572
|
+
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
573
|
+
|
574
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
+
|
576
|
+
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
577
|
+
|
578
|
+
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
579
|
+
|
580
|
+
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
+
|
544
582
|
## gkebackup.BackupPlanIamPolicy
|
545
583
|
|
546
584
|
```python
|
@@ -265,6 +265,25 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
|
|
265
265
|
member="user:jane@example.com")
|
266
266
|
```
|
267
267
|
|
268
|
+
## This resource supports User Project Overrides.
|
269
|
+
|
270
|
+
-
|
271
|
+
|
272
|
+
# IAM policy for Backup for GKE BackupPlan
|
273
|
+
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
274
|
+
|
275
|
+
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
276
|
+
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
277
|
+
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
278
|
+
|
279
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
280
|
+
|
281
|
+
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
282
|
+
|
283
|
+
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
284
|
+
|
285
|
+
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
286
|
+
|
268
287
|
## gkebackup.BackupPlanIamPolicy
|
269
288
|
|
270
289
|
```python
|
@@ -426,6 +445,25 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
|
|
426
445
|
member="user:jane@example.com")
|
427
446
|
```
|
428
447
|
|
448
|
+
## This resource supports User Project Overrides.
|
449
|
+
|
450
|
+
-
|
451
|
+
|
452
|
+
# IAM policy for Backup for GKE BackupPlan
|
453
|
+
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
454
|
+
|
455
|
+
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
456
|
+
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
457
|
+
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
458
|
+
|
459
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
460
|
+
|
461
|
+
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
462
|
+
|
463
|
+
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
464
|
+
|
465
|
+
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
466
|
+
|
429
467
|
## gkebackup.BackupPlanIamPolicy
|
430
468
|
|
431
469
|
```python
|
@@ -368,6 +368,25 @@ class RestorePlanIamBinding(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
+
## This resource supports User Project Overrides.
|
372
|
+
|
373
|
+
-
|
374
|
+
|
375
|
+
# IAM policy for Backup for GKE RestorePlan
|
376
|
+
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
377
|
+
|
378
|
+
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
379
|
+
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
380
|
+
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
381
|
+
|
382
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
+
|
384
|
+
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
385
|
+
|
386
|
+
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
387
|
+
|
388
|
+
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
+
|
371
390
|
## gkebackup.RestorePlanIamPolicy
|
372
391
|
|
373
392
|
```python
|
@@ -541,6 +560,25 @@ class RestorePlanIamBinding(pulumi.CustomResource):
|
|
541
560
|
member="user:jane@example.com")
|
542
561
|
```
|
543
562
|
|
563
|
+
## This resource supports User Project Overrides.
|
564
|
+
|
565
|
+
-
|
566
|
+
|
567
|
+
# IAM policy for Backup for GKE RestorePlan
|
568
|
+
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
569
|
+
|
570
|
+
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
571
|
+
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
572
|
+
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
573
|
+
|
574
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
+
|
576
|
+
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
577
|
+
|
578
|
+
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
579
|
+
|
580
|
+
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
+
|
544
582
|
## gkebackup.RestorePlanIamPolicy
|
545
583
|
|
546
584
|
```python
|
@@ -368,6 +368,25 @@ class RestorePlanIamMember(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
+
## This resource supports User Project Overrides.
|
372
|
+
|
373
|
+
-
|
374
|
+
|
375
|
+
# IAM policy for Backup for GKE RestorePlan
|
376
|
+
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
377
|
+
|
378
|
+
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
379
|
+
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
380
|
+
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
381
|
+
|
382
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
+
|
384
|
+
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
385
|
+
|
386
|
+
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
387
|
+
|
388
|
+
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
+
|
371
390
|
## gkebackup.RestorePlanIamPolicy
|
372
391
|
|
373
392
|
```python
|
@@ -541,6 +560,25 @@ class RestorePlanIamMember(pulumi.CustomResource):
|
|
541
560
|
member="user:jane@example.com")
|
542
561
|
```
|
543
562
|
|
563
|
+
## This resource supports User Project Overrides.
|
564
|
+
|
565
|
+
-
|
566
|
+
|
567
|
+
# IAM policy for Backup for GKE RestorePlan
|
568
|
+
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
569
|
+
|
570
|
+
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
571
|
+
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
572
|
+
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
573
|
+
|
574
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
+
|
576
|
+
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
577
|
+
|
578
|
+
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
579
|
+
|
580
|
+
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
+
|
544
582
|
## gkebackup.RestorePlanIamPolicy
|
545
583
|
|
546
584
|
```python
|
@@ -265,6 +265,25 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
|
|
265
265
|
member="user:jane@example.com")
|
266
266
|
```
|
267
267
|
|
268
|
+
## This resource supports User Project Overrides.
|
269
|
+
|
270
|
+
-
|
271
|
+
|
272
|
+
# IAM policy for Backup for GKE RestorePlan
|
273
|
+
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
274
|
+
|
275
|
+
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
276
|
+
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
277
|
+
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
278
|
+
|
279
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
280
|
+
|
281
|
+
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
282
|
+
|
283
|
+
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
284
|
+
|
285
|
+
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
286
|
+
|
268
287
|
## gkebackup.RestorePlanIamPolicy
|
269
288
|
|
270
289
|
```python
|
@@ -426,6 +445,25 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
|
|
426
445
|
member="user:jane@example.com")
|
427
446
|
```
|
428
447
|
|
448
|
+
## This resource supports User Project Overrides.
|
449
|
+
|
450
|
+
-
|
451
|
+
|
452
|
+
# IAM policy for Backup for GKE RestorePlan
|
453
|
+
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
454
|
+
|
455
|
+
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
456
|
+
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
457
|
+
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
458
|
+
|
459
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
460
|
+
|
461
|
+
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
462
|
+
|
463
|
+
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
464
|
+
|
465
|
+
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
466
|
+
|
429
467
|
## gkebackup.RestorePlanIamPolicy
|
430
468
|
|
431
469
|
```python
|
@@ -364,6 +364,25 @@ class FeatureIamBinding(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
+
## This resource supports User Project Overrides.
|
368
|
+
|
369
|
+
-
|
370
|
+
|
371
|
+
# IAM policy for GKEHub Feature
|
372
|
+
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
373
|
+
|
374
|
+
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
375
|
+
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
376
|
+
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
377
|
+
|
378
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
+
|
380
|
+
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
381
|
+
|
382
|
+
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
383
|
+
|
384
|
+
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
+
|
367
386
|
## gkehub.FeatureIamPolicy
|
368
387
|
|
369
388
|
```python
|
@@ -536,6 +555,25 @@ class FeatureIamBinding(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for GKEHub Feature
|
563
|
+
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
566
|
+
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
567
|
+
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
572
|
+
|
573
|
+
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## gkehub.FeatureIamPolicy
|
540
578
|
|
541
579
|
```python
|