pulumi-gcp 7.35.0a1722940030__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -300,21 +300,6 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
|
|
300
300
|
member="user:jane@example.com")
|
301
301
|
```
|
302
302
|
|
303
|
-
## pubsub.SubscriptionIAMPolicy
|
304
|
-
|
305
|
-
```python
|
306
|
-
import pulumi
|
307
|
-
import pulumi_gcp as gcp
|
308
|
-
|
309
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
310
|
-
"role": "roles/editor",
|
311
|
-
"members": ["user:jane@example.com"],
|
312
|
-
}])
|
313
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
314
|
-
subscription="your-subscription-name",
|
315
|
-
policy_data=admin.policy_data)
|
316
|
-
```
|
317
|
-
|
318
303
|
## pubsub.SubscriptionIAMBinding
|
319
304
|
|
320
305
|
```python
|
@@ -438,21 +423,6 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
|
|
438
423
|
member="user:jane@example.com")
|
439
424
|
```
|
440
425
|
|
441
|
-
## pubsub.SubscriptionIAMPolicy
|
442
|
-
|
443
|
-
```python
|
444
|
-
import pulumi
|
445
|
-
import pulumi_gcp as gcp
|
446
|
-
|
447
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
448
|
-
"role": "roles/editor",
|
449
|
-
"members": ["user:jane@example.com"],
|
450
|
-
}])
|
451
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
452
|
-
subscription="your-subscription-name",
|
453
|
-
policy_data=admin.policy_data)
|
454
|
-
```
|
455
|
-
|
456
426
|
## pubsub.SubscriptionIAMBinding
|
457
427
|
|
458
428
|
```python
|
@@ -300,21 +300,6 @@ class SubscriptionIAMMember(pulumi.CustomResource):
|
|
300
300
|
member="user:jane@example.com")
|
301
301
|
```
|
302
302
|
|
303
|
-
## pubsub.SubscriptionIAMPolicy
|
304
|
-
|
305
|
-
```python
|
306
|
-
import pulumi
|
307
|
-
import pulumi_gcp as gcp
|
308
|
-
|
309
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
310
|
-
"role": "roles/editor",
|
311
|
-
"members": ["user:jane@example.com"],
|
312
|
-
}])
|
313
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
314
|
-
subscription="your-subscription-name",
|
315
|
-
policy_data=admin.policy_data)
|
316
|
-
```
|
317
|
-
|
318
303
|
## pubsub.SubscriptionIAMBinding
|
319
304
|
|
320
305
|
```python
|
@@ -438,21 +423,6 @@ class SubscriptionIAMMember(pulumi.CustomResource):
|
|
438
423
|
member="user:jane@example.com")
|
439
424
|
```
|
440
425
|
|
441
|
-
## pubsub.SubscriptionIAMPolicy
|
442
|
-
|
443
|
-
```python
|
444
|
-
import pulumi
|
445
|
-
import pulumi_gcp as gcp
|
446
|
-
|
447
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
448
|
-
"role": "roles/editor",
|
449
|
-
"members": ["user:jane@example.com"],
|
450
|
-
}])
|
451
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
452
|
-
subscription="your-subscription-name",
|
453
|
-
policy_data=admin.policy_data)
|
454
|
-
```
|
455
|
-
|
456
426
|
## pubsub.SubscriptionIAMBinding
|
457
427
|
|
458
428
|
```python
|
@@ -217,21 +217,6 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
|
|
217
217
|
member="user:jane@example.com")
|
218
218
|
```
|
219
219
|
|
220
|
-
## pubsub.SubscriptionIAMPolicy
|
221
|
-
|
222
|
-
```python
|
223
|
-
import pulumi
|
224
|
-
import pulumi_gcp as gcp
|
225
|
-
|
226
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
227
|
-
"role": "roles/editor",
|
228
|
-
"members": ["user:jane@example.com"],
|
229
|
-
}])
|
230
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
231
|
-
subscription="your-subscription-name",
|
232
|
-
policy_data=admin.policy_data)
|
233
|
-
```
|
234
|
-
|
235
220
|
## pubsub.SubscriptionIAMBinding
|
236
221
|
|
237
222
|
```python
|
@@ -348,21 +333,6 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
|
|
348
333
|
member="user:jane@example.com")
|
349
334
|
```
|
350
335
|
|
351
|
-
## pubsub.SubscriptionIAMPolicy
|
352
|
-
|
353
|
-
```python
|
354
|
-
import pulumi
|
355
|
-
import pulumi_gcp as gcp
|
356
|
-
|
357
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
358
|
-
"role": "roles/editor",
|
359
|
-
"members": ["user:jane@example.com"],
|
360
|
-
}])
|
361
|
-
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
362
|
-
subscription="your-subscription-name",
|
363
|
-
policy_data=admin.policy_data)
|
364
|
-
```
|
365
|
-
|
366
336
|
## pubsub.SubscriptionIAMBinding
|
367
337
|
|
368
338
|
```python
|
@@ -319,6 +319,25 @@ class TopicIAMBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Topic
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
330
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
331
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
336
|
+
|
337
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.TopicIAMPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class TopicIAMBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Topic
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
510
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
511
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
516
|
+
|
517
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.TopicIAMPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class TopicIAMMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Topic
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
330
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
331
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
336
|
+
|
337
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.TopicIAMPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class TopicIAMMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Topic
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
510
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
511
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
516
|
+
|
517
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.TopicIAMPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class TopicIAMPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Cloud Pub/Sub Topic
|
224
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
227
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
228
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
233
|
+
|
234
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## pubsub.TopicIAMPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class TopicIAMPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Cloud Pub/Sub Topic
|
392
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
395
|
+
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
396
|
+
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
401
|
+
|
402
|
+
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## pubsub.TopicIAMPolicy
|
369
407
|
|
370
408
|
```python
|
pulumi_gcp/pulumi-plugin.json
CHANGED
@@ -380,6 +380,27 @@ class SecretIamBinding(pulumi.CustomResource):
|
|
380
380
|
})
|
381
381
|
```
|
382
382
|
|
383
|
+
## This resource supports User Project Overrides.
|
384
|
+
|
385
|
+
-
|
386
|
+
|
387
|
+
# IAM policy for Secret Manager Secret
|
388
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
389
|
+
|
390
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
391
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
392
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
393
|
+
|
394
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
395
|
+
|
396
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
397
|
+
|
398
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
399
|
+
|
400
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
401
|
+
|
402
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
403
|
+
|
383
404
|
## secretmanager.SecretIamPolicy
|
384
405
|
|
385
406
|
```python
|
@@ -654,6 +675,27 @@ class SecretIamBinding(pulumi.CustomResource):
|
|
654
675
|
})
|
655
676
|
```
|
656
677
|
|
678
|
+
## This resource supports User Project Overrides.
|
679
|
+
|
680
|
+
-
|
681
|
+
|
682
|
+
# IAM policy for Secret Manager Secret
|
683
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
684
|
+
|
685
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
686
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
687
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
688
|
+
|
689
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
690
|
+
|
691
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
692
|
+
|
693
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
694
|
+
|
695
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
696
|
+
|
697
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
698
|
+
|
657
699
|
## secretmanager.SecretIamPolicy
|
658
700
|
|
659
701
|
```python
|
@@ -380,6 +380,27 @@ class SecretIamMember(pulumi.CustomResource):
|
|
380
380
|
})
|
381
381
|
```
|
382
382
|
|
383
|
+
## This resource supports User Project Overrides.
|
384
|
+
|
385
|
+
-
|
386
|
+
|
387
|
+
# IAM policy for Secret Manager Secret
|
388
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
389
|
+
|
390
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
391
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
392
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
393
|
+
|
394
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
395
|
+
|
396
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
397
|
+
|
398
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
399
|
+
|
400
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
401
|
+
|
402
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
403
|
+
|
383
404
|
## secretmanager.SecretIamPolicy
|
384
405
|
|
385
406
|
```python
|
@@ -654,6 +675,27 @@ class SecretIamMember(pulumi.CustomResource):
|
|
654
675
|
})
|
655
676
|
```
|
656
677
|
|
678
|
+
## This resource supports User Project Overrides.
|
679
|
+
|
680
|
+
-
|
681
|
+
|
682
|
+
# IAM policy for Secret Manager Secret
|
683
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
684
|
+
|
685
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
686
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
687
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
688
|
+
|
689
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
690
|
+
|
691
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
692
|
+
|
693
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
694
|
+
|
695
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
696
|
+
|
697
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
698
|
+
|
657
699
|
## secretmanager.SecretIamPolicy
|
658
700
|
|
659
701
|
```python
|
@@ -265,6 +265,27 @@ class SecretIamPolicy(pulumi.CustomResource):
|
|
265
265
|
})
|
266
266
|
```
|
267
267
|
|
268
|
+
## This resource supports User Project Overrides.
|
269
|
+
|
270
|
+
-
|
271
|
+
|
272
|
+
# IAM policy for Secret Manager Secret
|
273
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
274
|
+
|
275
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
276
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
277
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
278
|
+
|
279
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
280
|
+
|
281
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
282
|
+
|
283
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
284
|
+
|
285
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
286
|
+
|
287
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
288
|
+
|
268
289
|
## secretmanager.SecretIamPolicy
|
269
290
|
|
270
291
|
```python
|
@@ -525,6 +546,27 @@ class SecretIamPolicy(pulumi.CustomResource):
|
|
525
546
|
})
|
526
547
|
```
|
527
548
|
|
549
|
+
## This resource supports User Project Overrides.
|
550
|
+
|
551
|
+
-
|
552
|
+
|
553
|
+
# IAM policy for Secret Manager Secret
|
554
|
+
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
555
|
+
|
556
|
+
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
557
|
+
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
558
|
+
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
559
|
+
|
560
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
561
|
+
|
562
|
+
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
563
|
+
|
564
|
+
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
565
|
+
|
566
|
+
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
567
|
+
|
568
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
569
|
+
|
528
570
|
## secretmanager.SecretIamPolicy
|
529
571
|
|
530
572
|
```python
|
@@ -371,6 +371,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
371
371
|
member="user:jane@example.com")
|
372
372
|
```
|
373
373
|
|
374
|
+
## This resource supports User Project Overrides.
|
375
|
+
|
376
|
+
-
|
377
|
+
|
378
|
+
# IAM policy for Secure Source Manager Repository
|
379
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
380
|
+
|
381
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
382
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
383
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
384
|
+
|
385
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
386
|
+
|
387
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
388
|
+
|
389
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
390
|
+
|
391
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
392
|
+
|
374
393
|
## securesourcemanager.RepositoryIamPolicy
|
375
394
|
|
376
395
|
```python
|
@@ -545,6 +564,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
545
564
|
member="user:jane@example.com")
|
546
565
|
```
|
547
566
|
|
567
|
+
## This resource supports User Project Overrides.
|
568
|
+
|
569
|
+
-
|
570
|
+
|
571
|
+
# IAM policy for Secure Source Manager Repository
|
572
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
573
|
+
|
574
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
575
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
576
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
577
|
+
|
578
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
579
|
+
|
580
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
581
|
+
|
582
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
583
|
+
|
584
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
585
|
+
|
548
586
|
## securesourcemanager.RepositoryIamPolicy
|
549
587
|
|
550
588
|
```python
|
@@ -371,6 +371,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
371
371
|
member="user:jane@example.com")
|
372
372
|
```
|
373
373
|
|
374
|
+
## This resource supports User Project Overrides.
|
375
|
+
|
376
|
+
-
|
377
|
+
|
378
|
+
# IAM policy for Secure Source Manager Repository
|
379
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
380
|
+
|
381
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
382
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
383
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
384
|
+
|
385
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
386
|
+
|
387
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
388
|
+
|
389
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
390
|
+
|
391
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
392
|
+
|
374
393
|
## securesourcemanager.RepositoryIamPolicy
|
375
394
|
|
376
395
|
```python
|
@@ -545,6 +564,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
545
564
|
member="user:jane@example.com")
|
546
565
|
```
|
547
566
|
|
567
|
+
## This resource supports User Project Overrides.
|
568
|
+
|
569
|
+
-
|
570
|
+
|
571
|
+
# IAM policy for Secure Source Manager Repository
|
572
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
573
|
+
|
574
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
575
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
576
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
577
|
+
|
578
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
579
|
+
|
580
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
581
|
+
|
582
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
583
|
+
|
584
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
585
|
+
|
548
586
|
## securesourcemanager.RepositoryIamPolicy
|
549
587
|
|
550
588
|
```python
|
@@ -268,6 +268,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
268
268
|
member="user:jane@example.com")
|
269
269
|
```
|
270
270
|
|
271
|
+
## This resource supports User Project Overrides.
|
272
|
+
|
273
|
+
-
|
274
|
+
|
275
|
+
# IAM policy for Secure Source Manager Repository
|
276
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
277
|
+
|
278
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
279
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
280
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
281
|
+
|
282
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
283
|
+
|
284
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
285
|
+
|
286
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
287
|
+
|
288
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
289
|
+
|
271
290
|
## securesourcemanager.RepositoryIamPolicy
|
272
291
|
|
273
292
|
```python
|
@@ -430,6 +449,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
430
449
|
member="user:jane@example.com")
|
431
450
|
```
|
432
451
|
|
452
|
+
## This resource supports User Project Overrides.
|
453
|
+
|
454
|
+
-
|
455
|
+
|
456
|
+
# IAM policy for Secure Source Manager Repository
|
457
|
+
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
458
|
+
|
459
|
+
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
460
|
+
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
461
|
+
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
462
|
+
|
463
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
+
|
465
|
+
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
466
|
+
|
467
|
+
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
468
|
+
|
469
|
+
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
+
|
433
471
|
## securesourcemanager.RepositoryIamPolicy
|
434
472
|
|
435
473
|
```python
|
@@ -155,9 +155,9 @@ def get_account(account_id: Optional[str] = None,
|
|
155
155
|
myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
|
156
156
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
157
157
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
158
|
-
metadata=
|
159
|
-
name
|
160
|
-
|
158
|
+
metadata={
|
159
|
+
"name": "google-application-credentials",
|
160
|
+
},
|
161
161
|
data={
|
162
162
|
"json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
163
163
|
})
|
@@ -220,9 +220,9 @@ def get_account_output(account_id: Optional[pulumi.Input[str]] = None,
|
|
220
220
|
myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
|
221
221
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
222
222
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
223
|
-
metadata=
|
224
|
-
name
|
225
|
-
|
223
|
+
metadata={
|
224
|
+
"name": "google-application-credentials",
|
225
|
+
},
|
226
226
|
data={
|
227
227
|
"json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
228
228
|
})
|