pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -364,25 +364,6 @@ class FeatureIamMember(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
-
## This resource supports User Project Overrides.
|
368
|
-
|
369
|
-
-
|
370
|
-
|
371
|
-
# IAM policy for GKEHub Feature
|
372
|
-
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
373
|
-
|
374
|
-
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
375
|
-
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
376
|
-
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
377
|
-
|
378
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
-
|
380
|
-
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
381
|
-
|
382
|
-
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
383
|
-
|
384
|
-
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
-
|
386
367
|
## gkehub.FeatureIamPolicy
|
387
368
|
|
388
369
|
```python
|
@@ -555,25 +536,6 @@ class FeatureIamMember(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for GKEHub Feature
|
563
|
-
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
566
|
-
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
567
|
-
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
572
|
-
|
573
|
-
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## gkehub.FeatureIamPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -261,25 +261,6 @@ class FeatureIamPolicy(pulumi.CustomResource):
|
|
261
261
|
member="user:jane@example.com")
|
262
262
|
```
|
263
263
|
|
264
|
-
## This resource supports User Project Overrides.
|
265
|
-
|
266
|
-
-
|
267
|
-
|
268
|
-
# IAM policy for GKEHub Feature
|
269
|
-
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
270
|
-
|
271
|
-
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
272
|
-
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
273
|
-
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
274
|
-
|
275
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
276
|
-
|
277
|
-
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
278
|
-
|
279
|
-
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
280
|
-
|
281
|
-
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
282
|
-
|
283
264
|
## gkehub.FeatureIamPolicy
|
284
265
|
|
285
266
|
```python
|
@@ -440,25 +421,6 @@ class FeatureIamPolicy(pulumi.CustomResource):
|
|
440
421
|
member="user:jane@example.com")
|
441
422
|
```
|
442
423
|
|
443
|
-
## This resource supports User Project Overrides.
|
444
|
-
|
445
|
-
-
|
446
|
-
|
447
|
-
# IAM policy for GKEHub Feature
|
448
|
-
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
449
|
-
|
450
|
-
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
451
|
-
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
452
|
-
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
453
|
-
|
454
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
-
|
456
|
-
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
457
|
-
|
458
|
-
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
459
|
-
|
460
|
-
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
-
|
462
424
|
## gkehub.FeatureIamPolicy
|
463
425
|
|
464
426
|
```python
|
@@ -363,25 +363,6 @@ class MembershipIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for GKEHub Membership
|
371
|
-
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
374
|
-
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
375
|
-
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
380
|
-
|
381
|
-
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## gkehub.MembershipIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -555,25 +536,6 @@ class MembershipIamBinding(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for GKEHub Membership
|
563
|
-
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
566
|
-
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
567
|
-
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
572
|
-
|
573
|
-
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## gkehub.MembershipIamPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -363,25 +363,6 @@ class MembershipIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for GKEHub Membership
|
371
|
-
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
374
|
-
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
375
|
-
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
380
|
-
|
381
|
-
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## gkehub.MembershipIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -555,25 +536,6 @@ class MembershipIamMember(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for GKEHub Membership
|
563
|
-
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
566
|
-
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
567
|
-
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
572
|
-
|
573
|
-
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## gkehub.MembershipIamPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -260,25 +260,6 @@ class MembershipIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
-
## This resource supports User Project Overrides.
|
264
|
-
|
265
|
-
-
|
266
|
-
|
267
|
-
# IAM policy for GKEHub Membership
|
268
|
-
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
269
|
-
|
270
|
-
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
271
|
-
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
272
|
-
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
273
|
-
|
274
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
-
|
276
|
-
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
277
|
-
|
278
|
-
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
279
|
-
|
280
|
-
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
-
|
282
263
|
## gkehub.MembershipIamPolicy
|
283
264
|
|
284
265
|
```python
|
@@ -440,25 +421,6 @@ class MembershipIamPolicy(pulumi.CustomResource):
|
|
440
421
|
member="user:jane@example.com")
|
441
422
|
```
|
442
423
|
|
443
|
-
## This resource supports User Project Overrides.
|
444
|
-
|
445
|
-
-
|
446
|
-
|
447
|
-
# IAM policy for GKEHub Membership
|
448
|
-
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
449
|
-
|
450
|
-
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
451
|
-
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
452
|
-
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
453
|
-
|
454
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
-
|
456
|
-
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
457
|
-
|
458
|
-
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
459
|
-
|
460
|
-
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
-
|
462
424
|
## gkehub.MembershipIamPolicy
|
463
425
|
|
464
426
|
```python
|
@@ -311,25 +311,6 @@ class ScopeIamBinding(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
-
## This resource supports User Project Overrides.
|
315
|
-
|
316
|
-
-
|
317
|
-
|
318
|
-
# IAM policy for GKEHub Scope
|
319
|
-
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
320
|
-
|
321
|
-
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
322
|
-
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
323
|
-
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
324
|
-
|
325
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
-
|
327
|
-
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
328
|
-
|
329
|
-
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
330
|
-
|
331
|
-
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
-
|
333
314
|
## gkehub.ScopeIamPolicy
|
334
315
|
|
335
316
|
```python
|
@@ -490,25 +471,6 @@ class ScopeIamBinding(pulumi.CustomResource):
|
|
490
471
|
member="user:jane@example.com")
|
491
472
|
```
|
492
473
|
|
493
|
-
## This resource supports User Project Overrides.
|
494
|
-
|
495
|
-
-
|
496
|
-
|
497
|
-
# IAM policy for GKEHub Scope
|
498
|
-
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
499
|
-
|
500
|
-
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
501
|
-
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
502
|
-
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
503
|
-
|
504
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
-
|
506
|
-
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
507
|
-
|
508
|
-
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
509
|
-
|
510
|
-
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
-
|
512
474
|
## gkehub.ScopeIamPolicy
|
513
475
|
|
514
476
|
```python
|
@@ -311,25 +311,6 @@ class ScopeIamMember(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
-
## This resource supports User Project Overrides.
|
315
|
-
|
316
|
-
-
|
317
|
-
|
318
|
-
# IAM policy for GKEHub Scope
|
319
|
-
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
320
|
-
|
321
|
-
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
322
|
-
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
323
|
-
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
324
|
-
|
325
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
-
|
327
|
-
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
328
|
-
|
329
|
-
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
330
|
-
|
331
|
-
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
-
|
333
314
|
## gkehub.ScopeIamPolicy
|
334
315
|
|
335
316
|
```python
|
@@ -490,25 +471,6 @@ class ScopeIamMember(pulumi.CustomResource):
|
|
490
471
|
member="user:jane@example.com")
|
491
472
|
```
|
492
473
|
|
493
|
-
## This resource supports User Project Overrides.
|
494
|
-
|
495
|
-
-
|
496
|
-
|
497
|
-
# IAM policy for GKEHub Scope
|
498
|
-
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
499
|
-
|
500
|
-
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
501
|
-
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
502
|
-
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
503
|
-
|
504
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
-
|
506
|
-
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
507
|
-
|
508
|
-
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
509
|
-
|
510
|
-
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
-
|
512
474
|
## gkehub.ScopeIamPolicy
|
513
475
|
|
514
476
|
```python
|
@@ -208,25 +208,6 @@ class ScopeIamPolicy(pulumi.CustomResource):
|
|
208
208
|
member="user:jane@example.com")
|
209
209
|
```
|
210
210
|
|
211
|
-
## This resource supports User Project Overrides.
|
212
|
-
|
213
|
-
-
|
214
|
-
|
215
|
-
# IAM policy for GKEHub Scope
|
216
|
-
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
217
|
-
|
218
|
-
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
219
|
-
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
220
|
-
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
221
|
-
|
222
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
223
|
-
|
224
|
-
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
225
|
-
|
226
|
-
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
227
|
-
|
228
|
-
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
229
|
-
|
230
211
|
## gkehub.ScopeIamPolicy
|
231
212
|
|
232
213
|
```python
|
@@ -375,25 +356,6 @@ class ScopeIamPolicy(pulumi.CustomResource):
|
|
375
356
|
member="user:jane@example.com")
|
376
357
|
```
|
377
358
|
|
378
|
-
## This resource supports User Project Overrides.
|
379
|
-
|
380
|
-
-
|
381
|
-
|
382
|
-
# IAM policy for GKEHub Scope
|
383
|
-
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
384
|
-
|
385
|
-
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
386
|
-
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
387
|
-
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
388
|
-
|
389
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
390
|
-
|
391
|
-
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
392
|
-
|
393
|
-
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
394
|
-
|
395
|
-
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
396
|
-
|
397
359
|
## gkehub.ScopeIamPolicy
|
398
360
|
|
399
361
|
```python
|
@@ -322,26 +322,6 @@ class ConsentStoreIamBinding(pulumi.CustomResource):
|
|
322
322
|
member="user:jane@example.com")
|
323
323
|
```
|
324
324
|
|
325
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
326
|
-
|
327
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
328
|
-
---
|
329
|
-
|
330
|
-
# IAM policy for Cloud Healthcare ConsentStore
|
331
|
-
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
332
|
-
|
333
|
-
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
334
|
-
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
335
|
-
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
336
|
-
|
337
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
338
|
-
|
339
|
-
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
340
|
-
|
341
|
-
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
342
|
-
|
343
|
-
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
344
|
-
|
345
325
|
## healthcare.ConsentStoreIamPolicy
|
346
326
|
|
347
327
|
```python
|
@@ -502,26 +482,6 @@ class ConsentStoreIamBinding(pulumi.CustomResource):
|
|
502
482
|
member="user:jane@example.com")
|
503
483
|
```
|
504
484
|
|
505
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
506
|
-
|
507
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
508
|
-
---
|
509
|
-
|
510
|
-
# IAM policy for Cloud Healthcare ConsentStore
|
511
|
-
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
512
|
-
|
513
|
-
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
514
|
-
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
515
|
-
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
516
|
-
|
517
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
518
|
-
|
519
|
-
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
520
|
-
|
521
|
-
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
522
|
-
|
523
|
-
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
524
|
-
|
525
485
|
## healthcare.ConsentStoreIamPolicy
|
526
486
|
|
527
487
|
```python
|
@@ -322,26 +322,6 @@ class ConsentStoreIamMember(pulumi.CustomResource):
|
|
322
322
|
member="user:jane@example.com")
|
323
323
|
```
|
324
324
|
|
325
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
326
|
-
|
327
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
328
|
-
---
|
329
|
-
|
330
|
-
# IAM policy for Cloud Healthcare ConsentStore
|
331
|
-
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
332
|
-
|
333
|
-
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
334
|
-
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
335
|
-
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
336
|
-
|
337
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
338
|
-
|
339
|
-
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
340
|
-
|
341
|
-
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
342
|
-
|
343
|
-
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
344
|
-
|
345
325
|
## healthcare.ConsentStoreIamPolicy
|
346
326
|
|
347
327
|
```python
|
@@ -502,26 +482,6 @@ class ConsentStoreIamMember(pulumi.CustomResource):
|
|
502
482
|
member="user:jane@example.com")
|
503
483
|
```
|
504
484
|
|
505
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
506
|
-
|
507
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
508
|
-
---
|
509
|
-
|
510
|
-
# IAM policy for Cloud Healthcare ConsentStore
|
511
|
-
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
512
|
-
|
513
|
-
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
514
|
-
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
515
|
-
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
516
|
-
|
517
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
518
|
-
|
519
|
-
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
520
|
-
|
521
|
-
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
522
|
-
|
523
|
-
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
524
|
-
|
525
485
|
## healthcare.ConsentStoreIamPolicy
|
526
486
|
|
527
487
|
```python
|
@@ -219,26 +219,6 @@ class ConsentStoreIamPolicy(pulumi.CustomResource):
|
|
219
219
|
member="user:jane@example.com")
|
220
220
|
```
|
221
221
|
|
222
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
223
|
-
|
224
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
225
|
-
---
|
226
|
-
|
227
|
-
# IAM policy for Cloud Healthcare ConsentStore
|
228
|
-
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
229
|
-
|
230
|
-
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
231
|
-
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
232
|
-
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
233
|
-
|
234
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
235
|
-
|
236
|
-
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
237
|
-
|
238
|
-
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
239
|
-
|
240
|
-
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
241
|
-
|
242
222
|
## healthcare.ConsentStoreIamPolicy
|
243
223
|
|
244
224
|
```python
|
@@ -387,26 +367,6 @@ class ConsentStoreIamPolicy(pulumi.CustomResource):
|
|
387
367
|
member="user:jane@example.com")
|
388
368
|
```
|
389
369
|
|
390
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
391
|
-
|
392
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
393
|
-
---
|
394
|
-
|
395
|
-
# IAM policy for Cloud Healthcare ConsentStore
|
396
|
-
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
397
|
-
|
398
|
-
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
399
|
-
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
400
|
-
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
401
|
-
|
402
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
-
|
404
|
-
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
405
|
-
|
406
|
-
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
407
|
-
|
408
|
-
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
-
|
410
370
|
## healthcare.ConsentStoreIamPolicy
|
411
371
|
|
412
372
|
```python
|
@@ -275,6 +275,21 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
275
275
|
member="user:jane@example.com")
|
276
276
|
```
|
277
277
|
|
278
|
+
## healthcare.DatasetIamPolicy
|
279
|
+
|
280
|
+
```python
|
281
|
+
import pulumi
|
282
|
+
import pulumi_gcp as gcp
|
283
|
+
|
284
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
285
|
+
"role": "roles/editor",
|
286
|
+
"members": ["user:jane@example.com"],
|
287
|
+
}])
|
288
|
+
dataset = gcp.healthcare.DatasetIamPolicy("dataset",
|
289
|
+
dataset_id="your-dataset-id",
|
290
|
+
policy_data=admin.policy_data)
|
291
|
+
```
|
292
|
+
|
278
293
|
## healthcare.DatasetIamBinding
|
279
294
|
|
280
295
|
```python
|
@@ -399,6 +414,21 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
399
414
|
member="user:jane@example.com")
|
400
415
|
```
|
401
416
|
|
417
|
+
## healthcare.DatasetIamPolicy
|
418
|
+
|
419
|
+
```python
|
420
|
+
import pulumi
|
421
|
+
import pulumi_gcp as gcp
|
422
|
+
|
423
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
424
|
+
"role": "roles/editor",
|
425
|
+
"members": ["user:jane@example.com"],
|
426
|
+
}])
|
427
|
+
dataset = gcp.healthcare.DatasetIamPolicy("dataset",
|
428
|
+
dataset_id="your-dataset-id",
|
429
|
+
policy_data=admin.policy_data)
|
430
|
+
```
|
431
|
+
|
402
432
|
## healthcare.DatasetIamBinding
|
403
433
|
|
404
434
|
```python
|