pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -300,6 +300,21 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
|
|
300
300
|
member="user:jane@example.com")
|
301
301
|
```
|
302
302
|
|
303
|
+
## pubsub.SubscriptionIAMPolicy
|
304
|
+
|
305
|
+
```python
|
306
|
+
import pulumi
|
307
|
+
import pulumi_gcp as gcp
|
308
|
+
|
309
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
310
|
+
"role": "roles/editor",
|
311
|
+
"members": ["user:jane@example.com"],
|
312
|
+
}])
|
313
|
+
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
314
|
+
subscription="your-subscription-name",
|
315
|
+
policy_data=admin.policy_data)
|
316
|
+
```
|
317
|
+
|
303
318
|
## pubsub.SubscriptionIAMBinding
|
304
319
|
|
305
320
|
```python
|
@@ -423,6 +438,21 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
|
|
423
438
|
member="user:jane@example.com")
|
424
439
|
```
|
425
440
|
|
441
|
+
## pubsub.SubscriptionIAMPolicy
|
442
|
+
|
443
|
+
```python
|
444
|
+
import pulumi
|
445
|
+
import pulumi_gcp as gcp
|
446
|
+
|
447
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
448
|
+
"role": "roles/editor",
|
449
|
+
"members": ["user:jane@example.com"],
|
450
|
+
}])
|
451
|
+
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
452
|
+
subscription="your-subscription-name",
|
453
|
+
policy_data=admin.policy_data)
|
454
|
+
```
|
455
|
+
|
426
456
|
## pubsub.SubscriptionIAMBinding
|
427
457
|
|
428
458
|
```python
|
@@ -300,6 +300,21 @@ class SubscriptionIAMMember(pulumi.CustomResource):
|
|
300
300
|
member="user:jane@example.com")
|
301
301
|
```
|
302
302
|
|
303
|
+
## pubsub.SubscriptionIAMPolicy
|
304
|
+
|
305
|
+
```python
|
306
|
+
import pulumi
|
307
|
+
import pulumi_gcp as gcp
|
308
|
+
|
309
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
310
|
+
"role": "roles/editor",
|
311
|
+
"members": ["user:jane@example.com"],
|
312
|
+
}])
|
313
|
+
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
314
|
+
subscription="your-subscription-name",
|
315
|
+
policy_data=admin.policy_data)
|
316
|
+
```
|
317
|
+
|
303
318
|
## pubsub.SubscriptionIAMBinding
|
304
319
|
|
305
320
|
```python
|
@@ -423,6 +438,21 @@ class SubscriptionIAMMember(pulumi.CustomResource):
|
|
423
438
|
member="user:jane@example.com")
|
424
439
|
```
|
425
440
|
|
441
|
+
## pubsub.SubscriptionIAMPolicy
|
442
|
+
|
443
|
+
```python
|
444
|
+
import pulumi
|
445
|
+
import pulumi_gcp as gcp
|
446
|
+
|
447
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
448
|
+
"role": "roles/editor",
|
449
|
+
"members": ["user:jane@example.com"],
|
450
|
+
}])
|
451
|
+
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
452
|
+
subscription="your-subscription-name",
|
453
|
+
policy_data=admin.policy_data)
|
454
|
+
```
|
455
|
+
|
426
456
|
## pubsub.SubscriptionIAMBinding
|
427
457
|
|
428
458
|
```python
|
@@ -217,6 +217,21 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
|
|
217
217
|
member="user:jane@example.com")
|
218
218
|
```
|
219
219
|
|
220
|
+
## pubsub.SubscriptionIAMPolicy
|
221
|
+
|
222
|
+
```python
|
223
|
+
import pulumi
|
224
|
+
import pulumi_gcp as gcp
|
225
|
+
|
226
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
227
|
+
"role": "roles/editor",
|
228
|
+
"members": ["user:jane@example.com"],
|
229
|
+
}])
|
230
|
+
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
231
|
+
subscription="your-subscription-name",
|
232
|
+
policy_data=admin.policy_data)
|
233
|
+
```
|
234
|
+
|
220
235
|
## pubsub.SubscriptionIAMBinding
|
221
236
|
|
222
237
|
```python
|
@@ -333,6 +348,21 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
|
|
333
348
|
member="user:jane@example.com")
|
334
349
|
```
|
335
350
|
|
351
|
+
## pubsub.SubscriptionIAMPolicy
|
352
|
+
|
353
|
+
```python
|
354
|
+
import pulumi
|
355
|
+
import pulumi_gcp as gcp
|
356
|
+
|
357
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
358
|
+
"role": "roles/editor",
|
359
|
+
"members": ["user:jane@example.com"],
|
360
|
+
}])
|
361
|
+
editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
|
362
|
+
subscription="your-subscription-name",
|
363
|
+
policy_data=admin.policy_data)
|
364
|
+
```
|
365
|
+
|
336
366
|
## pubsub.SubscriptionIAMBinding
|
337
367
|
|
338
368
|
```python
|
@@ -319,25 +319,6 @@ class TopicIAMBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud Pub/Sub Topic
|
327
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
330
|
-
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
331
|
-
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
336
|
-
|
337
|
-
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## pubsub.TopicIAMPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class TopicIAMBinding(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Cloud Pub/Sub Topic
|
507
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
510
|
-
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
511
|
-
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
516
|
-
|
517
|
-
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## pubsub.TopicIAMPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -319,25 +319,6 @@ class TopicIAMMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud Pub/Sub Topic
|
327
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
330
|
-
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
331
|
-
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
336
|
-
|
337
|
-
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## pubsub.TopicIAMPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class TopicIAMMember(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Cloud Pub/Sub Topic
|
507
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
510
|
-
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
511
|
-
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
516
|
-
|
517
|
-
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## pubsub.TopicIAMPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -216,25 +216,6 @@ class TopicIAMPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
-
## This resource supports User Project Overrides.
|
220
|
-
|
221
|
-
-
|
222
|
-
|
223
|
-
# IAM policy for Cloud Pub/Sub Topic
|
224
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
225
|
-
|
226
|
-
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
227
|
-
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
228
|
-
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
229
|
-
|
230
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
-
|
232
|
-
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
233
|
-
|
234
|
-
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
235
|
-
|
236
|
-
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
237
|
-
|
238
219
|
## pubsub.TopicIAMPolicy
|
239
220
|
|
240
221
|
```python
|
@@ -384,25 +365,6 @@ class TopicIAMPolicy(pulumi.CustomResource):
|
|
384
365
|
member="user:jane@example.com")
|
385
366
|
```
|
386
367
|
|
387
|
-
## This resource supports User Project Overrides.
|
388
|
-
|
389
|
-
-
|
390
|
-
|
391
|
-
# IAM policy for Cloud Pub/Sub Topic
|
392
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
|
393
|
-
|
394
|
-
* `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
|
395
|
-
* `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
|
396
|
-
* `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
|
397
|
-
|
398
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
-
|
400
|
-
* `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
|
401
|
-
|
402
|
-
> **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
|
403
|
-
|
404
|
-
> **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
|
405
|
-
|
406
368
|
## pubsub.TopicIAMPolicy
|
407
369
|
|
408
370
|
```python
|
pulumi_gcp/pulumi-plugin.json
CHANGED
@@ -380,27 +380,6 @@ class SecretIamBinding(pulumi.CustomResource):
|
|
380
380
|
})
|
381
381
|
```
|
382
382
|
|
383
|
-
## This resource supports User Project Overrides.
|
384
|
-
|
385
|
-
-
|
386
|
-
|
387
|
-
# IAM policy for Secret Manager Secret
|
388
|
-
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
389
|
-
|
390
|
-
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
391
|
-
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
392
|
-
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
393
|
-
|
394
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
395
|
-
|
396
|
-
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
397
|
-
|
398
|
-
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
399
|
-
|
400
|
-
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
401
|
-
|
402
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
403
|
-
|
404
383
|
## secretmanager.SecretIamPolicy
|
405
384
|
|
406
385
|
```python
|
@@ -675,27 +654,6 @@ class SecretIamBinding(pulumi.CustomResource):
|
|
675
654
|
})
|
676
655
|
```
|
677
656
|
|
678
|
-
## This resource supports User Project Overrides.
|
679
|
-
|
680
|
-
-
|
681
|
-
|
682
|
-
# IAM policy for Secret Manager Secret
|
683
|
-
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
684
|
-
|
685
|
-
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
686
|
-
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
687
|
-
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
688
|
-
|
689
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
690
|
-
|
691
|
-
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
692
|
-
|
693
|
-
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
694
|
-
|
695
|
-
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
696
|
-
|
697
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
698
|
-
|
699
657
|
## secretmanager.SecretIamPolicy
|
700
658
|
|
701
659
|
```python
|
@@ -380,27 +380,6 @@ class SecretIamMember(pulumi.CustomResource):
|
|
380
380
|
})
|
381
381
|
```
|
382
382
|
|
383
|
-
## This resource supports User Project Overrides.
|
384
|
-
|
385
|
-
-
|
386
|
-
|
387
|
-
# IAM policy for Secret Manager Secret
|
388
|
-
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
389
|
-
|
390
|
-
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
391
|
-
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
392
|
-
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
393
|
-
|
394
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
395
|
-
|
396
|
-
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
397
|
-
|
398
|
-
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
399
|
-
|
400
|
-
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
401
|
-
|
402
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
403
|
-
|
404
383
|
## secretmanager.SecretIamPolicy
|
405
384
|
|
406
385
|
```python
|
@@ -675,27 +654,6 @@ class SecretIamMember(pulumi.CustomResource):
|
|
675
654
|
})
|
676
655
|
```
|
677
656
|
|
678
|
-
## This resource supports User Project Overrides.
|
679
|
-
|
680
|
-
-
|
681
|
-
|
682
|
-
# IAM policy for Secret Manager Secret
|
683
|
-
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
684
|
-
|
685
|
-
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
686
|
-
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
687
|
-
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
688
|
-
|
689
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
690
|
-
|
691
|
-
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
692
|
-
|
693
|
-
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
694
|
-
|
695
|
-
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
696
|
-
|
697
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
698
|
-
|
699
657
|
## secretmanager.SecretIamPolicy
|
700
658
|
|
701
659
|
```python
|
@@ -265,27 +265,6 @@ class SecretIamPolicy(pulumi.CustomResource):
|
|
265
265
|
})
|
266
266
|
```
|
267
267
|
|
268
|
-
## This resource supports User Project Overrides.
|
269
|
-
|
270
|
-
-
|
271
|
-
|
272
|
-
# IAM policy for Secret Manager Secret
|
273
|
-
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
274
|
-
|
275
|
-
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
276
|
-
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
277
|
-
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
278
|
-
|
279
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
280
|
-
|
281
|
-
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
282
|
-
|
283
|
-
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
284
|
-
|
285
|
-
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
286
|
-
|
287
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
288
|
-
|
289
268
|
## secretmanager.SecretIamPolicy
|
290
269
|
|
291
270
|
```python
|
@@ -546,27 +525,6 @@ class SecretIamPolicy(pulumi.CustomResource):
|
|
546
525
|
})
|
547
526
|
```
|
548
527
|
|
549
|
-
## This resource supports User Project Overrides.
|
550
|
-
|
551
|
-
-
|
552
|
-
|
553
|
-
# IAM policy for Secret Manager Secret
|
554
|
-
Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
|
555
|
-
|
556
|
-
* `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
|
557
|
-
* `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
|
558
|
-
* `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
|
559
|
-
|
560
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
561
|
-
|
562
|
-
* `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
|
563
|
-
|
564
|
-
> **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
|
565
|
-
|
566
|
-
> **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
|
567
|
-
|
568
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
569
|
-
|
570
528
|
## secretmanager.SecretIamPolicy
|
571
529
|
|
572
530
|
```python
|
@@ -371,25 +371,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
371
371
|
member="user:jane@example.com")
|
372
372
|
```
|
373
373
|
|
374
|
-
## This resource supports User Project Overrides.
|
375
|
-
|
376
|
-
-
|
377
|
-
|
378
|
-
# IAM policy for Secure Source Manager Repository
|
379
|
-
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
380
|
-
|
381
|
-
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
382
|
-
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
383
|
-
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
384
|
-
|
385
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
386
|
-
|
387
|
-
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
388
|
-
|
389
|
-
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
390
|
-
|
391
|
-
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
392
|
-
|
393
374
|
## securesourcemanager.RepositoryIamPolicy
|
394
375
|
|
395
376
|
```python
|
@@ -564,25 +545,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
564
545
|
member="user:jane@example.com")
|
565
546
|
```
|
566
547
|
|
567
|
-
## This resource supports User Project Overrides.
|
568
|
-
|
569
|
-
-
|
570
|
-
|
571
|
-
# IAM policy for Secure Source Manager Repository
|
572
|
-
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
573
|
-
|
574
|
-
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
575
|
-
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
576
|
-
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
577
|
-
|
578
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
579
|
-
|
580
|
-
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
581
|
-
|
582
|
-
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
583
|
-
|
584
|
-
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
585
|
-
|
586
548
|
## securesourcemanager.RepositoryIamPolicy
|
587
549
|
|
588
550
|
```python
|
@@ -371,25 +371,6 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
371
371
|
member="user:jane@example.com")
|
372
372
|
```
|
373
373
|
|
374
|
-
## This resource supports User Project Overrides.
|
375
|
-
|
376
|
-
-
|
377
|
-
|
378
|
-
# IAM policy for Secure Source Manager Repository
|
379
|
-
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
380
|
-
|
381
|
-
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
382
|
-
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
383
|
-
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
384
|
-
|
385
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
386
|
-
|
387
|
-
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
388
|
-
|
389
|
-
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
390
|
-
|
391
|
-
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
392
|
-
|
393
374
|
## securesourcemanager.RepositoryIamPolicy
|
394
375
|
|
395
376
|
```python
|
@@ -564,25 +545,6 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
564
545
|
member="user:jane@example.com")
|
565
546
|
```
|
566
547
|
|
567
|
-
## This resource supports User Project Overrides.
|
568
|
-
|
569
|
-
-
|
570
|
-
|
571
|
-
# IAM policy for Secure Source Manager Repository
|
572
|
-
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
573
|
-
|
574
|
-
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
575
|
-
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
576
|
-
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
577
|
-
|
578
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
579
|
-
|
580
|
-
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
581
|
-
|
582
|
-
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
583
|
-
|
584
|
-
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
585
|
-
|
586
548
|
## securesourcemanager.RepositoryIamPolicy
|
587
549
|
|
588
550
|
```python
|
@@ -268,25 +268,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
268
268
|
member="user:jane@example.com")
|
269
269
|
```
|
270
270
|
|
271
|
-
## This resource supports User Project Overrides.
|
272
|
-
|
273
|
-
-
|
274
|
-
|
275
|
-
# IAM policy for Secure Source Manager Repository
|
276
|
-
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
277
|
-
|
278
|
-
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
279
|
-
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
280
|
-
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
281
|
-
|
282
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
283
|
-
|
284
|
-
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
285
|
-
|
286
|
-
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
287
|
-
|
288
|
-
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
289
|
-
|
290
271
|
## securesourcemanager.RepositoryIamPolicy
|
291
272
|
|
292
273
|
```python
|
@@ -449,25 +430,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
449
430
|
member="user:jane@example.com")
|
450
431
|
```
|
451
432
|
|
452
|
-
## This resource supports User Project Overrides.
|
453
|
-
|
454
|
-
-
|
455
|
-
|
456
|
-
# IAM policy for Secure Source Manager Repository
|
457
|
-
Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
|
458
|
-
|
459
|
-
* `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
460
|
-
* `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
461
|
-
* `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
462
|
-
|
463
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
-
|
465
|
-
* `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
466
|
-
|
467
|
-
> **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
|
468
|
-
|
469
|
-
> **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
-
|
471
433
|
## securesourcemanager.RepositoryIamPolicy
|
472
434
|
|
473
435
|
```python
|
@@ -155,9 +155,9 @@ def get_account(account_id: Optional[str] = None,
|
|
155
155
|
myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
|
156
156
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
157
157
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
158
|
-
metadata=
|
159
|
-
|
160
|
-
|
158
|
+
metadata=kubernetes.meta.v1.ObjectMetaArgs(
|
159
|
+
name="google-application-credentials",
|
160
|
+
),
|
161
161
|
data={
|
162
162
|
"json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
163
163
|
})
|
@@ -220,9 +220,9 @@ def get_account_output(account_id: Optional[pulumi.Input[str]] = None,
|
|
220
220
|
myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
|
221
221
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
222
222
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
223
|
-
metadata=
|
224
|
-
|
225
|
-
|
223
|
+
metadata=kubernetes.meta.v1.ObjectMetaArgs(
|
224
|
+
name="google-application-credentials",
|
225
|
+
),
|
226
226
|
data={
|
227
227
|
"json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
228
228
|
})
|