pulumi-gcp 7.35.0a1722940030__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -388,6 +388,27 @@ class WebTypeAppEngingIamMember(pulumi.CustomResource):
|
|
388
388
|
})
|
389
389
|
```
|
390
390
|
|
391
|
+
## This resource supports User Project Overrides.
|
392
|
+
|
393
|
+
-
|
394
|
+
|
395
|
+
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
396
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
397
|
+
|
398
|
+
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
399
|
+
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
400
|
+
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
401
|
+
|
402
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
+
|
404
|
+
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
405
|
+
|
406
|
+
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
407
|
+
|
408
|
+
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
+
|
410
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
411
|
+
|
391
412
|
## iap.WebTypeAppEngingIamPolicy
|
392
413
|
|
393
414
|
```python
|
@@ -663,6 +684,27 @@ class WebTypeAppEngingIamMember(pulumi.CustomResource):
|
|
663
684
|
})
|
664
685
|
```
|
665
686
|
|
687
|
+
## This resource supports User Project Overrides.
|
688
|
+
|
689
|
+
-
|
690
|
+
|
691
|
+
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
692
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
693
|
+
|
694
|
+
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
695
|
+
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
696
|
+
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
697
|
+
|
698
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
699
|
+
|
700
|
+
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
701
|
+
|
702
|
+
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
703
|
+
|
704
|
+
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
705
|
+
|
706
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
707
|
+
|
666
708
|
## iap.WebTypeAppEngingIamPolicy
|
667
709
|
|
668
710
|
```python
|
@@ -273,6 +273,27 @@ class WebTypeAppEngingIamPolicy(pulumi.CustomResource):
|
|
273
273
|
})
|
274
274
|
```
|
275
275
|
|
276
|
+
## This resource supports User Project Overrides.
|
277
|
+
|
278
|
+
-
|
279
|
+
|
280
|
+
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
281
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
282
|
+
|
283
|
+
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
284
|
+
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
285
|
+
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
286
|
+
|
287
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
288
|
+
|
289
|
+
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
290
|
+
|
291
|
+
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
292
|
+
|
293
|
+
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
294
|
+
|
295
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
296
|
+
|
276
297
|
## iap.WebTypeAppEngingIamPolicy
|
277
298
|
|
278
299
|
```python
|
@@ -534,6 +555,27 @@ class WebTypeAppEngingIamPolicy(pulumi.CustomResource):
|
|
534
555
|
})
|
535
556
|
```
|
536
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
563
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
566
|
+
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
567
|
+
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
572
|
+
|
573
|
+
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
577
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
578
|
+
|
537
579
|
## iap.WebTypeAppEngingIamPolicy
|
538
580
|
|
539
581
|
```python
|
@@ -350,6 +350,27 @@ class WebTypeComputeIamBinding(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
+
## This resource supports User Project Overrides.
|
354
|
+
|
355
|
+
-
|
356
|
+
|
357
|
+
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
358
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
359
|
+
|
360
|
+
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
361
|
+
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
362
|
+
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
363
|
+
|
364
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
+
|
366
|
+
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
367
|
+
|
368
|
+
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
369
|
+
|
370
|
+
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
+
|
372
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
+
|
353
374
|
## iap.WebTypeComputeIamPolicy
|
354
375
|
|
355
376
|
```python
|
@@ -610,6 +631,27 @@ class WebTypeComputeIamBinding(pulumi.CustomResource):
|
|
610
631
|
})
|
611
632
|
```
|
612
633
|
|
634
|
+
## This resource supports User Project Overrides.
|
635
|
+
|
636
|
+
-
|
637
|
+
|
638
|
+
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
639
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
640
|
+
|
641
|
+
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
642
|
+
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
643
|
+
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
644
|
+
|
645
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
+
|
647
|
+
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
648
|
+
|
649
|
+
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
650
|
+
|
651
|
+
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
+
|
653
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
+
|
613
655
|
## iap.WebTypeComputeIamPolicy
|
614
656
|
|
615
657
|
```python
|
@@ -350,6 +350,27 @@ class WebTypeComputeIamMember(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
+
## This resource supports User Project Overrides.
|
354
|
+
|
355
|
+
-
|
356
|
+
|
357
|
+
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
358
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
359
|
+
|
360
|
+
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
361
|
+
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
362
|
+
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
363
|
+
|
364
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
+
|
366
|
+
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
367
|
+
|
368
|
+
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
369
|
+
|
370
|
+
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
+
|
372
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
+
|
353
374
|
## iap.WebTypeComputeIamPolicy
|
354
375
|
|
355
376
|
```python
|
@@ -610,6 +631,27 @@ class WebTypeComputeIamMember(pulumi.CustomResource):
|
|
610
631
|
})
|
611
632
|
```
|
612
633
|
|
634
|
+
## This resource supports User Project Overrides.
|
635
|
+
|
636
|
+
-
|
637
|
+
|
638
|
+
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
639
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
640
|
+
|
641
|
+
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
642
|
+
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
643
|
+
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
644
|
+
|
645
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
+
|
647
|
+
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
648
|
+
|
649
|
+
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
650
|
+
|
651
|
+
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
+
|
653
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
+
|
613
655
|
## iap.WebTypeComputeIamPolicy
|
614
656
|
|
615
657
|
```python
|
@@ -235,6 +235,27 @@ class WebTypeComputeIamPolicy(pulumi.CustomResource):
|
|
235
235
|
})
|
236
236
|
```
|
237
237
|
|
238
|
+
## This resource supports User Project Overrides.
|
239
|
+
|
240
|
+
-
|
241
|
+
|
242
|
+
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
243
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
244
|
+
|
245
|
+
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
246
|
+
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
247
|
+
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
248
|
+
|
249
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
250
|
+
|
251
|
+
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
252
|
+
|
253
|
+
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
254
|
+
|
255
|
+
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
256
|
+
|
257
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
258
|
+
|
238
259
|
## iap.WebTypeComputeIamPolicy
|
239
260
|
|
240
261
|
```python
|
@@ -481,6 +502,27 @@ class WebTypeComputeIamPolicy(pulumi.CustomResource):
|
|
481
502
|
})
|
482
503
|
```
|
483
504
|
|
505
|
+
## This resource supports User Project Overrides.
|
506
|
+
|
507
|
+
-
|
508
|
+
|
509
|
+
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
510
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
511
|
+
|
512
|
+
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
513
|
+
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
514
|
+
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
515
|
+
|
516
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
517
|
+
|
518
|
+
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
519
|
+
|
520
|
+
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
521
|
+
|
522
|
+
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
523
|
+
|
524
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
525
|
+
|
484
526
|
## iap.WebTypeComputeIamPolicy
|
485
527
|
|
486
528
|
```python
|
@@ -347,47 +347,6 @@ class KeyRingIAMBinding(pulumi.CustomResource):
|
|
347
347
|
})
|
348
348
|
```
|
349
349
|
|
350
|
-
## kms.KeyRingIAMPolicy
|
351
|
-
|
352
|
-
```python
|
353
|
-
import pulumi
|
354
|
-
import pulumi_gcp as gcp
|
355
|
-
|
356
|
-
keyring = gcp.kms.KeyRing("keyring",
|
357
|
-
name="keyring-example",
|
358
|
-
location="global")
|
359
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
360
|
-
"role": "roles/editor",
|
361
|
-
"members": ["user:jane@example.com"],
|
362
|
-
}])
|
363
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
364
|
-
key_ring_id=keyring.id,
|
365
|
-
policy_data=admin.policy_data)
|
366
|
-
```
|
367
|
-
|
368
|
-
With IAM Conditions:
|
369
|
-
|
370
|
-
```python
|
371
|
-
import pulumi
|
372
|
-
import pulumi_gcp as gcp
|
373
|
-
|
374
|
-
keyring = gcp.kms.KeyRing("keyring",
|
375
|
-
name="keyring-example",
|
376
|
-
location="global")
|
377
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
378
|
-
"role": "roles/editor",
|
379
|
-
"members": ["user:jane@example.com"],
|
380
|
-
"condition": {
|
381
|
-
"title": "expires_after_2019_12_31",
|
382
|
-
"description": "Expiring at midnight of 2019-12-31",
|
383
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
384
|
-
},
|
385
|
-
}])
|
386
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
387
|
-
key_ring_id=keyring.id,
|
388
|
-
policy_data=admin.policy_data)
|
389
|
-
```
|
390
|
-
|
391
350
|
## kms.KeyRingIAMBinding
|
392
351
|
|
393
352
|
```python
|
@@ -608,47 +567,6 @@ class KeyRingIAMBinding(pulumi.CustomResource):
|
|
608
567
|
})
|
609
568
|
```
|
610
569
|
|
611
|
-
## kms.KeyRingIAMPolicy
|
612
|
-
|
613
|
-
```python
|
614
|
-
import pulumi
|
615
|
-
import pulumi_gcp as gcp
|
616
|
-
|
617
|
-
keyring = gcp.kms.KeyRing("keyring",
|
618
|
-
name="keyring-example",
|
619
|
-
location="global")
|
620
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
621
|
-
"role": "roles/editor",
|
622
|
-
"members": ["user:jane@example.com"],
|
623
|
-
}])
|
624
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
625
|
-
key_ring_id=keyring.id,
|
626
|
-
policy_data=admin.policy_data)
|
627
|
-
```
|
628
|
-
|
629
|
-
With IAM Conditions:
|
630
|
-
|
631
|
-
```python
|
632
|
-
import pulumi
|
633
|
-
import pulumi_gcp as gcp
|
634
|
-
|
635
|
-
keyring = gcp.kms.KeyRing("keyring",
|
636
|
-
name="keyring-example",
|
637
|
-
location="global")
|
638
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
639
|
-
"role": "roles/editor",
|
640
|
-
"members": ["user:jane@example.com"],
|
641
|
-
"condition": {
|
642
|
-
"title": "expires_after_2019_12_31",
|
643
|
-
"description": "Expiring at midnight of 2019-12-31",
|
644
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
645
|
-
},
|
646
|
-
}])
|
647
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
648
|
-
key_ring_id=keyring.id,
|
649
|
-
policy_data=admin.policy_data)
|
650
|
-
```
|
651
|
-
|
652
570
|
## kms.KeyRingIAMBinding
|
653
571
|
|
654
572
|
```python
|
@@ -347,47 +347,6 @@ class KeyRingIAMMember(pulumi.CustomResource):
|
|
347
347
|
})
|
348
348
|
```
|
349
349
|
|
350
|
-
## kms.KeyRingIAMPolicy
|
351
|
-
|
352
|
-
```python
|
353
|
-
import pulumi
|
354
|
-
import pulumi_gcp as gcp
|
355
|
-
|
356
|
-
keyring = gcp.kms.KeyRing("keyring",
|
357
|
-
name="keyring-example",
|
358
|
-
location="global")
|
359
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
360
|
-
"role": "roles/editor",
|
361
|
-
"members": ["user:jane@example.com"],
|
362
|
-
}])
|
363
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
364
|
-
key_ring_id=keyring.id,
|
365
|
-
policy_data=admin.policy_data)
|
366
|
-
```
|
367
|
-
|
368
|
-
With IAM Conditions:
|
369
|
-
|
370
|
-
```python
|
371
|
-
import pulumi
|
372
|
-
import pulumi_gcp as gcp
|
373
|
-
|
374
|
-
keyring = gcp.kms.KeyRing("keyring",
|
375
|
-
name="keyring-example",
|
376
|
-
location="global")
|
377
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
378
|
-
"role": "roles/editor",
|
379
|
-
"members": ["user:jane@example.com"],
|
380
|
-
"condition": {
|
381
|
-
"title": "expires_after_2019_12_31",
|
382
|
-
"description": "Expiring at midnight of 2019-12-31",
|
383
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
384
|
-
},
|
385
|
-
}])
|
386
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
387
|
-
key_ring_id=keyring.id,
|
388
|
-
policy_data=admin.policy_data)
|
389
|
-
```
|
390
|
-
|
391
350
|
## kms.KeyRingIAMBinding
|
392
351
|
|
393
352
|
```python
|
@@ -608,47 +567,6 @@ class KeyRingIAMMember(pulumi.CustomResource):
|
|
608
567
|
})
|
609
568
|
```
|
610
569
|
|
611
|
-
## kms.KeyRingIAMPolicy
|
612
|
-
|
613
|
-
```python
|
614
|
-
import pulumi
|
615
|
-
import pulumi_gcp as gcp
|
616
|
-
|
617
|
-
keyring = gcp.kms.KeyRing("keyring",
|
618
|
-
name="keyring-example",
|
619
|
-
location="global")
|
620
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
621
|
-
"role": "roles/editor",
|
622
|
-
"members": ["user:jane@example.com"],
|
623
|
-
}])
|
624
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
625
|
-
key_ring_id=keyring.id,
|
626
|
-
policy_data=admin.policy_data)
|
627
|
-
```
|
628
|
-
|
629
|
-
With IAM Conditions:
|
630
|
-
|
631
|
-
```python
|
632
|
-
import pulumi
|
633
|
-
import pulumi_gcp as gcp
|
634
|
-
|
635
|
-
keyring = gcp.kms.KeyRing("keyring",
|
636
|
-
name="keyring-example",
|
637
|
-
location="global")
|
638
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
639
|
-
"role": "roles/editor",
|
640
|
-
"members": ["user:jane@example.com"],
|
641
|
-
"condition": {
|
642
|
-
"title": "expires_after_2019_12_31",
|
643
|
-
"description": "Expiring at midnight of 2019-12-31",
|
644
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
645
|
-
},
|
646
|
-
}])
|
647
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
648
|
-
key_ring_id=keyring.id,
|
649
|
-
policy_data=admin.policy_data)
|
650
|
-
```
|
651
|
-
|
652
570
|
## kms.KeyRingIAMBinding
|
653
571
|
|
654
572
|
```python
|
@@ -244,47 +244,6 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
|
|
244
244
|
})
|
245
245
|
```
|
246
246
|
|
247
|
-
## kms.KeyRingIAMPolicy
|
248
|
-
|
249
|
-
```python
|
250
|
-
import pulumi
|
251
|
-
import pulumi_gcp as gcp
|
252
|
-
|
253
|
-
keyring = gcp.kms.KeyRing("keyring",
|
254
|
-
name="keyring-example",
|
255
|
-
location="global")
|
256
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
257
|
-
"role": "roles/editor",
|
258
|
-
"members": ["user:jane@example.com"],
|
259
|
-
}])
|
260
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
261
|
-
key_ring_id=keyring.id,
|
262
|
-
policy_data=admin.policy_data)
|
263
|
-
```
|
264
|
-
|
265
|
-
With IAM Conditions:
|
266
|
-
|
267
|
-
```python
|
268
|
-
import pulumi
|
269
|
-
import pulumi_gcp as gcp
|
270
|
-
|
271
|
-
keyring = gcp.kms.KeyRing("keyring",
|
272
|
-
name="keyring-example",
|
273
|
-
location="global")
|
274
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
275
|
-
"role": "roles/editor",
|
276
|
-
"members": ["user:jane@example.com"],
|
277
|
-
"condition": {
|
278
|
-
"title": "expires_after_2019_12_31",
|
279
|
-
"description": "Expiring at midnight of 2019-12-31",
|
280
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
281
|
-
},
|
282
|
-
}])
|
283
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
284
|
-
key_ring_id=keyring.id,
|
285
|
-
policy_data=admin.policy_data)
|
286
|
-
```
|
287
|
-
|
288
247
|
## kms.KeyRingIAMBinding
|
289
248
|
|
290
249
|
```python
|
@@ -494,47 +453,6 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
|
|
494
453
|
})
|
495
454
|
```
|
496
455
|
|
497
|
-
## kms.KeyRingIAMPolicy
|
498
|
-
|
499
|
-
```python
|
500
|
-
import pulumi
|
501
|
-
import pulumi_gcp as gcp
|
502
|
-
|
503
|
-
keyring = gcp.kms.KeyRing("keyring",
|
504
|
-
name="keyring-example",
|
505
|
-
location="global")
|
506
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
507
|
-
"role": "roles/editor",
|
508
|
-
"members": ["user:jane@example.com"],
|
509
|
-
}])
|
510
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
511
|
-
key_ring_id=keyring.id,
|
512
|
-
policy_data=admin.policy_data)
|
513
|
-
```
|
514
|
-
|
515
|
-
With IAM Conditions:
|
516
|
-
|
517
|
-
```python
|
518
|
-
import pulumi
|
519
|
-
import pulumi_gcp as gcp
|
520
|
-
|
521
|
-
keyring = gcp.kms.KeyRing("keyring",
|
522
|
-
name="keyring-example",
|
523
|
-
location="global")
|
524
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
525
|
-
"role": "roles/editor",
|
526
|
-
"members": ["user:jane@example.com"],
|
527
|
-
"condition": {
|
528
|
-
"title": "expires_after_2019_12_31",
|
529
|
-
"description": "Expiring at midnight of 2019-12-31",
|
530
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
531
|
-
},
|
532
|
-
}])
|
533
|
-
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
534
|
-
key_ring_id=keyring.id,
|
535
|
-
policy_data=admin.policy_data)
|
536
|
-
```
|
537
|
-
|
538
456
|
## kms.KeyRingIAMBinding
|
539
457
|
|
540
458
|
```python
|
@@ -363,6 +363,25 @@ class InstanceIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud AI Notebooks Instance
|
371
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
374
|
+
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
375
|
+
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
380
|
+
|
381
|
+
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## notebooks.InstanceIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class InstanceIamBinding(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud AI Notebooks Instance
|
562
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
565
|
+
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
566
|
+
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
571
|
+
|
572
|
+
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## notebooks.InstanceIamPolicy
|
539
577
|
|
540
578
|
```python
|