pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -359,25 +359,6 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
-
## This resource supports User Project Overrides.
|
363
|
-
|
364
|
-
-
|
365
|
-
|
366
|
-
# IAM policy for Dataproc metastore Federation
|
367
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
|
368
|
-
|
369
|
-
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
370
|
-
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
371
|
-
* `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
|
372
|
-
|
373
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
-
|
375
|
-
* `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
|
376
|
-
|
377
|
-
> **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
|
378
|
-
|
379
|
-
> **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
-
|
381
362
|
## dataproc.MetastoreFederationIamPolicy
|
382
363
|
|
383
364
|
```python
|
@@ -550,25 +531,6 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
550
531
|
member="user:jane@example.com")
|
551
532
|
```
|
552
533
|
|
553
|
-
## This resource supports User Project Overrides.
|
554
|
-
|
555
|
-
-
|
556
|
-
|
557
|
-
# IAM policy for Dataproc metastore Federation
|
558
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
|
559
|
-
|
560
|
-
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
561
|
-
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
562
|
-
* `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
|
563
|
-
|
564
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
-
|
566
|
-
* `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
|
567
|
-
|
568
|
-
> **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
|
569
|
-
|
570
|
-
> **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
-
|
572
534
|
## dataproc.MetastoreFederationIamPolicy
|
573
535
|
|
574
536
|
```python
|
@@ -256,25 +256,6 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
-
## This resource supports User Project Overrides.
|
260
|
-
|
261
|
-
-
|
262
|
-
|
263
|
-
# IAM policy for Dataproc metastore Federation
|
264
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
|
265
|
-
|
266
|
-
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
267
|
-
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
268
|
-
* `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
|
269
|
-
|
270
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
-
|
272
|
-
* `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
|
273
|
-
|
274
|
-
> **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
|
275
|
-
|
276
|
-
> **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
-
|
278
259
|
## dataproc.MetastoreFederationIamPolicy
|
279
260
|
|
280
261
|
```python
|
@@ -435,25 +416,6 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
435
416
|
member="user:jane@example.com")
|
436
417
|
```
|
437
418
|
|
438
|
-
## This resource supports User Project Overrides.
|
439
|
-
|
440
|
-
-
|
441
|
-
|
442
|
-
# IAM policy for Dataproc metastore Federation
|
443
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
|
444
|
-
|
445
|
-
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
446
|
-
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
447
|
-
* `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
|
448
|
-
|
449
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
-
|
451
|
-
* `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
|
452
|
-
|
453
|
-
> **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
|
454
|
-
|
455
|
-
> **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
-
|
457
419
|
## dataproc.MetastoreFederationIamPolicy
|
458
420
|
|
459
421
|
```python
|
@@ -363,25 +363,6 @@ class MetastoreServiceIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for Dataproc metastore Service
|
371
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
374
|
-
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
375
|
-
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
380
|
-
|
381
|
-
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## dataproc.MetastoreServiceIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -555,25 +536,6 @@ class MetastoreServiceIamBinding(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Dataproc metastore Service
|
563
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
566
|
-
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
567
|
-
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
572
|
-
|
573
|
-
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## dataproc.MetastoreServiceIamPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -363,25 +363,6 @@ class MetastoreServiceIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for Dataproc metastore Service
|
371
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
374
|
-
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
375
|
-
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
380
|
-
|
381
|
-
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## dataproc.MetastoreServiceIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -555,25 +536,6 @@ class MetastoreServiceIamMember(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Dataproc metastore Service
|
563
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
566
|
-
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
567
|
-
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
572
|
-
|
573
|
-
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## dataproc.MetastoreServiceIamPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -260,25 +260,6 @@ class MetastoreServiceIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
-
## This resource supports User Project Overrides.
|
264
|
-
|
265
|
-
-
|
266
|
-
|
267
|
-
# IAM policy for Dataproc metastore Service
|
268
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
269
|
-
|
270
|
-
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
271
|
-
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
272
|
-
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
273
|
-
|
274
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
-
|
276
|
-
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
277
|
-
|
278
|
-
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
279
|
-
|
280
|
-
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
-
|
282
263
|
## dataproc.MetastoreServiceIamPolicy
|
283
264
|
|
284
265
|
```python
|
@@ -440,25 +421,6 @@ class MetastoreServiceIamPolicy(pulumi.CustomResource):
|
|
440
421
|
member="user:jane@example.com")
|
441
422
|
```
|
442
423
|
|
443
|
-
## This resource supports User Project Overrides.
|
444
|
-
|
445
|
-
-
|
446
|
-
|
447
|
-
# IAM policy for Dataproc metastore Service
|
448
|
-
Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
|
449
|
-
|
450
|
-
* `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
451
|
-
* `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
452
|
-
* `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
453
|
-
|
454
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
-
|
456
|
-
* `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
|
457
|
-
|
458
|
-
> **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
|
459
|
-
|
460
|
-
> **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
-
|
462
424
|
## dataproc.MetastoreServiceIamPolicy
|
463
425
|
|
464
426
|
```python
|
@@ -319,25 +319,6 @@ class DnsManagedZoneIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud DNS ManagedZone
|
327
|
-
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
330
|
-
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
331
|
-
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
336
|
-
|
337
|
-
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## dns.DnsManagedZoneIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class DnsManagedZoneIamBinding(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Cloud DNS ManagedZone
|
507
|
-
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
510
|
-
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
511
|
-
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
516
|
-
|
517
|
-
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## dns.DnsManagedZoneIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -319,25 +319,6 @@ class DnsManagedZoneIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud DNS ManagedZone
|
327
|
-
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
330
|
-
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
331
|
-
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
336
|
-
|
337
|
-
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## dns.DnsManagedZoneIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class DnsManagedZoneIamMember(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Cloud DNS ManagedZone
|
507
|
-
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
510
|
-
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
511
|
-
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
516
|
-
|
517
|
-
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## dns.DnsManagedZoneIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -216,25 +216,6 @@ class DnsManagedZoneIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
-
## This resource supports User Project Overrides.
|
220
|
-
|
221
|
-
-
|
222
|
-
|
223
|
-
# IAM policy for Cloud DNS ManagedZone
|
224
|
-
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
225
|
-
|
226
|
-
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
227
|
-
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
228
|
-
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
229
|
-
|
230
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
-
|
232
|
-
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
233
|
-
|
234
|
-
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
235
|
-
|
236
|
-
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
-
|
238
219
|
## dns.DnsManagedZoneIamPolicy
|
239
220
|
|
240
221
|
```python
|
@@ -384,25 +365,6 @@ class DnsManagedZoneIamPolicy(pulumi.CustomResource):
|
|
384
365
|
member="user:jane@example.com")
|
385
366
|
```
|
386
367
|
|
387
|
-
## This resource supports User Project Overrides.
|
388
|
-
|
389
|
-
-
|
390
|
-
|
391
|
-
# IAM policy for Cloud DNS ManagedZone
|
392
|
-
Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
|
393
|
-
|
394
|
-
* `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
|
395
|
-
* `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
|
396
|
-
* `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
|
397
|
-
|
398
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
-
|
400
|
-
* `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
|
401
|
-
|
402
|
-
> **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
|
403
|
-
|
404
|
-
> **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
-
|
406
368
|
## dns.DnsManagedZoneIamPolicy
|
407
369
|
|
408
370
|
```python
|
@@ -271,26 +271,6 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
271
271
|
member="user:jane@example.com")
|
272
272
|
```
|
273
273
|
|
274
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
275
|
-
|
276
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
277
|
-
---
|
278
|
-
|
279
|
-
# IAM policy for Cloud Endpoints Service
|
280
|
-
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
281
|
-
|
282
|
-
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
283
|
-
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
284
|
-
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
285
|
-
|
286
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
287
|
-
|
288
|
-
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
289
|
-
|
290
|
-
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
291
|
-
|
292
|
-
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
293
|
-
|
294
274
|
## endpoints.ServiceIamPolicy
|
295
275
|
|
296
276
|
```python
|
@@ -441,26 +421,6 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
441
421
|
member="user:jane@example.com")
|
442
422
|
```
|
443
423
|
|
444
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
445
|
-
|
446
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
447
|
-
---
|
448
|
-
|
449
|
-
# IAM policy for Cloud Endpoints Service
|
450
|
-
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
451
|
-
|
452
|
-
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
453
|
-
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
454
|
-
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
455
|
-
|
456
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
457
|
-
|
458
|
-
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
459
|
-
|
460
|
-
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
461
|
-
|
462
|
-
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
463
|
-
|
464
424
|
## endpoints.ServiceIamPolicy
|
465
425
|
|
466
426
|
```python
|
@@ -271,26 +271,6 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
271
271
|
member="user:jane@example.com")
|
272
272
|
```
|
273
273
|
|
274
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
275
|
-
|
276
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
277
|
-
---
|
278
|
-
|
279
|
-
# IAM policy for Cloud Endpoints Service
|
280
|
-
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
281
|
-
|
282
|
-
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
283
|
-
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
284
|
-
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
285
|
-
|
286
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
287
|
-
|
288
|
-
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
289
|
-
|
290
|
-
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
291
|
-
|
292
|
-
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
293
|
-
|
294
274
|
## endpoints.ServiceIamPolicy
|
295
275
|
|
296
276
|
```python
|
@@ -441,26 +421,6 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
441
421
|
member="user:jane@example.com")
|
442
422
|
```
|
443
423
|
|
444
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
445
|
-
|
446
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
447
|
-
---
|
448
|
-
|
449
|
-
# IAM policy for Cloud Endpoints Service
|
450
|
-
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
451
|
-
|
452
|
-
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
453
|
-
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
454
|
-
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
455
|
-
|
456
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
457
|
-
|
458
|
-
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
459
|
-
|
460
|
-
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
461
|
-
|
462
|
-
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
463
|
-
|
464
424
|
## endpoints.ServiceIamPolicy
|
465
425
|
|
466
426
|
```python
|
@@ -168,26 +168,6 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
168
168
|
member="user:jane@example.com")
|
169
169
|
```
|
170
170
|
|
171
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
172
|
-
|
173
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
174
|
-
---
|
175
|
-
|
176
|
-
# IAM policy for Cloud Endpoints Service
|
177
|
-
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
178
|
-
|
179
|
-
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
180
|
-
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
181
|
-
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
182
|
-
|
183
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
184
|
-
|
185
|
-
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
186
|
-
|
187
|
-
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
188
|
-
|
189
|
-
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
190
|
-
|
191
171
|
## endpoints.ServiceIamPolicy
|
192
172
|
|
193
173
|
```python
|
@@ -326,26 +306,6 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
326
306
|
member="user:jane@example.com")
|
327
307
|
```
|
328
308
|
|
329
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
330
|
-
|
331
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
332
|
-
---
|
333
|
-
|
334
|
-
# IAM policy for Cloud Endpoints Service
|
335
|
-
Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
|
336
|
-
|
337
|
-
* `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
338
|
-
* `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
339
|
-
* `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
340
|
-
|
341
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
342
|
-
|
343
|
-
* `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
344
|
-
|
345
|
-
> **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
|
346
|
-
|
347
|
-
> **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
348
|
-
|
349
309
|
## endpoints.ServiceIamPolicy
|
350
310
|
|
351
311
|
```python
|