pulumi-gcp 7.35.0a1722940030__py3-none-any.whl → 7.36.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -273,6 +273,27 @@ class ImageIamPolicy(pulumi.CustomResource):
|
|
273
273
|
})
|
274
274
|
```
|
275
275
|
|
276
|
+
## This resource supports User Project Overrides.
|
277
|
+
|
278
|
+
-
|
279
|
+
|
280
|
+
# IAM policy for Compute Engine Image
|
281
|
+
Three different resources help you manage your IAM policy for Compute Engine Image. Each of these resources serves a different use case:
|
282
|
+
|
283
|
+
* `compute.ImageIamPolicy`: Authoritative. Sets the IAM policy for the image and replaces any existing policy already attached.
|
284
|
+
* `compute.ImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the image are preserved.
|
285
|
+
* `compute.ImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the image are preserved.
|
286
|
+
|
287
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
288
|
+
|
289
|
+
* `compute.ImageIamPolicy`: Retrieves the IAM policy for the image
|
290
|
+
|
291
|
+
> **Note:** `compute.ImageIamPolicy` **cannot** be used in conjunction with `compute.ImageIamBinding` and `compute.ImageIamMember` or they will fight over what your policy should be.
|
292
|
+
|
293
|
+
> **Note:** `compute.ImageIamBinding` resources **can be** used in conjunction with `compute.ImageIamMember` resources **only if** they do not grant privilege to the same role.
|
294
|
+
|
295
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
296
|
+
|
276
297
|
## compute.ImageIamPolicy
|
277
298
|
|
278
299
|
```python
|
@@ -534,6 +555,27 @@ class ImageIamPolicy(pulumi.CustomResource):
|
|
534
555
|
})
|
535
556
|
```
|
536
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Compute Engine Image
|
563
|
+
Three different resources help you manage your IAM policy for Compute Engine Image. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `compute.ImageIamPolicy`: Authoritative. Sets the IAM policy for the image and replaces any existing policy already attached.
|
566
|
+
* `compute.ImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the image are preserved.
|
567
|
+
* `compute.ImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the image are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `compute.ImageIamPolicy`: Retrieves the IAM policy for the image
|
572
|
+
|
573
|
+
> **Note:** `compute.ImageIamPolicy` **cannot** be used in conjunction with `compute.ImageIamBinding` and `compute.ImageIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `compute.ImageIamBinding` resources **can be** used in conjunction with `compute.ImageIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
577
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
578
|
+
|
537
579
|
## compute.ImageIamPolicy
|
538
580
|
|
539
581
|
```python
|
@@ -435,6 +435,27 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
435
435
|
})
|
436
436
|
```
|
437
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for Compute Engine Instance
|
443
|
+
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
446
|
+
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
447
|
+
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
452
|
+
|
453
|
+
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
457
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
458
|
+
|
438
459
|
## compute.InstanceIAMPolicy
|
439
460
|
|
440
461
|
```python
|
@@ -727,6 +748,27 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
727
748
|
})
|
728
749
|
```
|
729
750
|
|
751
|
+
## This resource supports User Project Overrides.
|
752
|
+
|
753
|
+
-
|
754
|
+
|
755
|
+
# IAM policy for Compute Engine Instance
|
756
|
+
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
757
|
+
|
758
|
+
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
759
|
+
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
760
|
+
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
761
|
+
|
762
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
763
|
+
|
764
|
+
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
765
|
+
|
766
|
+
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
767
|
+
|
768
|
+
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
769
|
+
|
770
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
771
|
+
|
730
772
|
## compute.InstanceIAMPolicy
|
731
773
|
|
732
774
|
```python
|
@@ -435,6 +435,27 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
435
435
|
})
|
436
436
|
```
|
437
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for Compute Engine Instance
|
443
|
+
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
446
|
+
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
447
|
+
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
452
|
+
|
453
|
+
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
457
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
458
|
+
|
438
459
|
## compute.InstanceIAMPolicy
|
439
460
|
|
440
461
|
```python
|
@@ -727,6 +748,27 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
727
748
|
})
|
728
749
|
```
|
729
750
|
|
751
|
+
## This resource supports User Project Overrides.
|
752
|
+
|
753
|
+
-
|
754
|
+
|
755
|
+
# IAM policy for Compute Engine Instance
|
756
|
+
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
757
|
+
|
758
|
+
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
759
|
+
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
760
|
+
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
761
|
+
|
762
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
763
|
+
|
764
|
+
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
765
|
+
|
766
|
+
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
767
|
+
|
768
|
+
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
769
|
+
|
770
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
771
|
+
|
730
772
|
## compute.InstanceIAMPolicy
|
731
773
|
|
732
774
|
```python
|
@@ -320,6 +320,27 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
320
320
|
})
|
321
321
|
```
|
322
322
|
|
323
|
+
## This resource supports User Project Overrides.
|
324
|
+
|
325
|
+
-
|
326
|
+
|
327
|
+
# IAM policy for Compute Engine Instance
|
328
|
+
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
329
|
+
|
330
|
+
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
331
|
+
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
332
|
+
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
333
|
+
|
334
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
335
|
+
|
336
|
+
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
337
|
+
|
338
|
+
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
339
|
+
|
340
|
+
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
341
|
+
|
342
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
343
|
+
|
323
344
|
## compute.InstanceIAMPolicy
|
324
345
|
|
325
346
|
```python
|
@@ -598,6 +619,27 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
598
619
|
})
|
599
620
|
```
|
600
621
|
|
622
|
+
## This resource supports User Project Overrides.
|
623
|
+
|
624
|
+
-
|
625
|
+
|
626
|
+
# IAM policy for Compute Engine Instance
|
627
|
+
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
628
|
+
|
629
|
+
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
630
|
+
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
631
|
+
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
632
|
+
|
633
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
634
|
+
|
635
|
+
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
636
|
+
|
637
|
+
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
638
|
+
|
639
|
+
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
640
|
+
|
641
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
642
|
+
|
601
643
|
## compute.InstanceIAMPolicy
|
602
644
|
|
603
645
|
```python
|
@@ -387,6 +387,26 @@ class MachineImageIamBinding(pulumi.CustomResource):
|
|
387
387
|
})
|
388
388
|
```
|
389
389
|
|
390
|
+
## This resource supports User Project Overrides.
|
391
|
+
|
392
|
+
-
|
393
|
+
|
394
|
+
# IAM policy for Compute Engine MachineImage
|
395
|
+
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
396
|
+
|
397
|
+
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
398
|
+
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
399
|
+
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
400
|
+
|
401
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
402
|
+
|
403
|
+
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
404
|
+
|
405
|
+
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
406
|
+
|
407
|
+
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
408
|
+
|
409
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
390
410
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
391
411
|
|
392
412
|
```python
|
@@ -661,6 +681,26 @@ class MachineImageIamBinding(pulumi.CustomResource):
|
|
661
681
|
})
|
662
682
|
```
|
663
683
|
|
684
|
+
## This resource supports User Project Overrides.
|
685
|
+
|
686
|
+
-
|
687
|
+
|
688
|
+
# IAM policy for Compute Engine MachineImage
|
689
|
+
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
690
|
+
|
691
|
+
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
692
|
+
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
693
|
+
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
694
|
+
|
695
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
696
|
+
|
697
|
+
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
698
|
+
|
699
|
+
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
700
|
+
|
701
|
+
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
702
|
+
|
703
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
664
704
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
665
705
|
|
666
706
|
```python
|
@@ -387,6 +387,26 @@ class MachineImageIamMember(pulumi.CustomResource):
|
|
387
387
|
})
|
388
388
|
```
|
389
389
|
|
390
|
+
## This resource supports User Project Overrides.
|
391
|
+
|
392
|
+
-
|
393
|
+
|
394
|
+
# IAM policy for Compute Engine MachineImage
|
395
|
+
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
396
|
+
|
397
|
+
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
398
|
+
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
399
|
+
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
400
|
+
|
401
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
402
|
+
|
403
|
+
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
404
|
+
|
405
|
+
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
406
|
+
|
407
|
+
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
408
|
+
|
409
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
390
410
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
391
411
|
|
392
412
|
```python
|
@@ -661,6 +681,26 @@ class MachineImageIamMember(pulumi.CustomResource):
|
|
661
681
|
})
|
662
682
|
```
|
663
683
|
|
684
|
+
## This resource supports User Project Overrides.
|
685
|
+
|
686
|
+
-
|
687
|
+
|
688
|
+
# IAM policy for Compute Engine MachineImage
|
689
|
+
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
690
|
+
|
691
|
+
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
692
|
+
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
693
|
+
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
694
|
+
|
695
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
696
|
+
|
697
|
+
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
698
|
+
|
699
|
+
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
700
|
+
|
701
|
+
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
702
|
+
|
703
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
664
704
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
665
705
|
|
666
706
|
```python
|
@@ -272,6 +272,26 @@ class MachineImageIamPolicy(pulumi.CustomResource):
|
|
272
272
|
})
|
273
273
|
```
|
274
274
|
|
275
|
+
## This resource supports User Project Overrides.
|
276
|
+
|
277
|
+
-
|
278
|
+
|
279
|
+
# IAM policy for Compute Engine MachineImage
|
280
|
+
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
281
|
+
|
282
|
+
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
283
|
+
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
284
|
+
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
285
|
+
|
286
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
287
|
+
|
288
|
+
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
289
|
+
|
290
|
+
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
291
|
+
|
292
|
+
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
293
|
+
|
294
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
275
295
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
276
296
|
|
277
297
|
```python
|
@@ -532,6 +552,26 @@ class MachineImageIamPolicy(pulumi.CustomResource):
|
|
532
552
|
})
|
533
553
|
```
|
534
554
|
|
555
|
+
## This resource supports User Project Overrides.
|
556
|
+
|
557
|
+
-
|
558
|
+
|
559
|
+
# IAM policy for Compute Engine MachineImage
|
560
|
+
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
561
|
+
|
562
|
+
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
563
|
+
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
564
|
+
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
565
|
+
|
566
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
567
|
+
|
568
|
+
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
569
|
+
|
570
|
+
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
571
|
+
|
572
|
+
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
573
|
+
|
574
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
535
575
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
536
576
|
|
537
577
|
```python
|
@@ -364,6 +364,25 @@ class RegionDiskIamBinding(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
+
## This resource supports User Project Overrides.
|
368
|
+
|
369
|
+
-
|
370
|
+
|
371
|
+
# IAM policy for Compute Engine RegionDisk
|
372
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
373
|
+
|
374
|
+
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
375
|
+
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
376
|
+
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
377
|
+
|
378
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
+
|
380
|
+
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
381
|
+
|
382
|
+
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
383
|
+
|
384
|
+
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
+
|
367
386
|
## compute.RegionDiskIamPolicy
|
368
387
|
|
369
388
|
```python
|
@@ -536,6 +555,25 @@ class RegionDiskIamBinding(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Compute Engine RegionDisk
|
563
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
566
|
+
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
567
|
+
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
572
|
+
|
573
|
+
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## compute.RegionDiskIamPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -364,6 +364,25 @@ class RegionDiskIamMember(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
+
## This resource supports User Project Overrides.
|
368
|
+
|
369
|
+
-
|
370
|
+
|
371
|
+
# IAM policy for Compute Engine RegionDisk
|
372
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
373
|
+
|
374
|
+
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
375
|
+
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
376
|
+
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
377
|
+
|
378
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
+
|
380
|
+
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
381
|
+
|
382
|
+
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
383
|
+
|
384
|
+
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
+
|
367
386
|
## compute.RegionDiskIamPolicy
|
368
387
|
|
369
388
|
```python
|
@@ -536,6 +555,25 @@ class RegionDiskIamMember(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Compute Engine RegionDisk
|
563
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
566
|
+
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
567
|
+
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
572
|
+
|
573
|
+
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## compute.RegionDiskIamPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -261,6 +261,25 @@ class RegionDiskIamPolicy(pulumi.CustomResource):
|
|
261
261
|
member="user:jane@example.com")
|
262
262
|
```
|
263
263
|
|
264
|
+
## This resource supports User Project Overrides.
|
265
|
+
|
266
|
+
-
|
267
|
+
|
268
|
+
# IAM policy for Compute Engine RegionDisk
|
269
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
270
|
+
|
271
|
+
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
272
|
+
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
273
|
+
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
274
|
+
|
275
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
276
|
+
|
277
|
+
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
278
|
+
|
279
|
+
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
280
|
+
|
281
|
+
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
282
|
+
|
264
283
|
## compute.RegionDiskIamPolicy
|
265
284
|
|
266
285
|
```python
|
@@ -421,6 +440,25 @@ class RegionDiskIamPolicy(pulumi.CustomResource):
|
|
421
440
|
member="user:jane@example.com")
|
422
441
|
```
|
423
442
|
|
443
|
+
## This resource supports User Project Overrides.
|
444
|
+
|
445
|
+
-
|
446
|
+
|
447
|
+
# IAM policy for Compute Engine RegionDisk
|
448
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
449
|
+
|
450
|
+
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
451
|
+
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
452
|
+
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
453
|
+
|
454
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
+
|
456
|
+
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
457
|
+
|
458
|
+
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
459
|
+
|
460
|
+
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
+
|
424
462
|
## compute.RegionDiskIamPolicy
|
425
463
|
|
426
464
|
```python
|
@@ -320,6 +320,25 @@ class SnapshotIamBinding(pulumi.CustomResource):
|
|
320
320
|
member="user:jane@example.com")
|
321
321
|
```
|
322
322
|
|
323
|
+
## This resource supports User Project Overrides.
|
324
|
+
|
325
|
+
-
|
326
|
+
|
327
|
+
# IAM policy for Compute Engine Snapshot
|
328
|
+
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
329
|
+
|
330
|
+
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
331
|
+
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
332
|
+
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
333
|
+
|
334
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
335
|
+
|
336
|
+
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
337
|
+
|
338
|
+
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
339
|
+
|
340
|
+
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
341
|
+
|
323
342
|
## compute.SnapshotIamPolicy
|
324
343
|
|
325
344
|
```python
|
@@ -481,6 +500,25 @@ class SnapshotIamBinding(pulumi.CustomResource):
|
|
481
500
|
member="user:jane@example.com")
|
482
501
|
```
|
483
502
|
|
503
|
+
## This resource supports User Project Overrides.
|
504
|
+
|
505
|
+
-
|
506
|
+
|
507
|
+
# IAM policy for Compute Engine Snapshot
|
508
|
+
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
509
|
+
|
510
|
+
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
511
|
+
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
512
|
+
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
513
|
+
|
514
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
515
|
+
|
516
|
+
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
517
|
+
|
518
|
+
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
519
|
+
|
520
|
+
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
521
|
+
|
484
522
|
## compute.SnapshotIamPolicy
|
485
523
|
|
486
524
|
```python
|