pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
pulumi_gcp/serviceaccount/key.py
CHANGED
@@ -402,9 +402,9 @@ class Key(pulumi.CustomResource):
|
|
402
402
|
display_name="My Service Account")
|
403
403
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
404
404
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
405
|
-
metadata=
|
406
|
-
|
407
|
-
|
405
|
+
metadata=kubernetes.meta.v1.ObjectMetaArgs(
|
406
|
+
name="google-application-credentials",
|
407
|
+
),
|
408
408
|
data={
|
409
409
|
"credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
410
410
|
})
|
@@ -488,9 +488,9 @@ class Key(pulumi.CustomResource):
|
|
488
488
|
display_name="My Service Account")
|
489
489
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
490
490
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
491
|
-
metadata=
|
492
|
-
|
493
|
-
|
491
|
+
metadata=kubernetes.meta.v1.ObjectMetaArgs(
|
492
|
+
name="google-application-credentials",
|
493
|
+
),
|
494
494
|
data={
|
495
495
|
"credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
496
496
|
})
|
@@ -280,26 +280,6 @@ class NamespaceIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
-
|
285
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
-
---
|
287
|
-
|
288
|
-
# IAM policy for Service Directory Namespace
|
289
|
-
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
290
|
-
|
291
|
-
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
292
|
-
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
293
|
-
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
294
|
-
|
295
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
-
|
297
|
-
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
298
|
-
|
299
|
-
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
300
|
-
|
301
|
-
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
-
|
303
283
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
304
284
|
|
305
285
|
```python
|
@@ -453,26 +433,6 @@ class NamespaceIamBinding(pulumi.CustomResource):
|
|
453
433
|
member="user:jane@example.com")
|
454
434
|
```
|
455
435
|
|
456
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
-
|
458
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
-
---
|
460
|
-
|
461
|
-
# IAM policy for Service Directory Namespace
|
462
|
-
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
463
|
-
|
464
|
-
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
465
|
-
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
466
|
-
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
467
|
-
|
468
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
-
|
470
|
-
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
471
|
-
|
472
|
-
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
473
|
-
|
474
|
-
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
-
|
476
436
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
477
437
|
|
478
438
|
```python
|
@@ -280,26 +280,6 @@ class NamespaceIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
-
|
285
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
-
---
|
287
|
-
|
288
|
-
# IAM policy for Service Directory Namespace
|
289
|
-
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
290
|
-
|
291
|
-
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
292
|
-
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
293
|
-
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
294
|
-
|
295
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
-
|
297
|
-
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
298
|
-
|
299
|
-
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
300
|
-
|
301
|
-
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
-
|
303
283
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
304
284
|
|
305
285
|
```python
|
@@ -453,26 +433,6 @@ class NamespaceIamMember(pulumi.CustomResource):
|
|
453
433
|
member="user:jane@example.com")
|
454
434
|
```
|
455
435
|
|
456
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
-
|
458
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
-
---
|
460
|
-
|
461
|
-
# IAM policy for Service Directory Namespace
|
462
|
-
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
463
|
-
|
464
|
-
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
465
|
-
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
466
|
-
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
467
|
-
|
468
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
-
|
470
|
-
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
471
|
-
|
472
|
-
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
473
|
-
|
474
|
-
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
-
|
476
436
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
477
437
|
|
478
438
|
```python
|
@@ -177,26 +177,6 @@ class NamespaceIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
-
|
182
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
-
---
|
184
|
-
|
185
|
-
# IAM policy for Service Directory Namespace
|
186
|
-
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
187
|
-
|
188
|
-
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
189
|
-
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
190
|
-
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
191
|
-
|
192
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
-
|
194
|
-
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
195
|
-
|
196
|
-
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
197
|
-
|
198
|
-
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
-
|
200
180
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
201
181
|
|
202
182
|
```python
|
@@ -338,26 +318,6 @@ class NamespaceIamPolicy(pulumi.CustomResource):
|
|
338
318
|
member="user:jane@example.com")
|
339
319
|
```
|
340
320
|
|
341
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
342
|
-
|
343
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
344
|
-
---
|
345
|
-
|
346
|
-
# IAM policy for Service Directory Namespace
|
347
|
-
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
348
|
-
|
349
|
-
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
350
|
-
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
351
|
-
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
352
|
-
|
353
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
354
|
-
|
355
|
-
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
356
|
-
|
357
|
-
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
358
|
-
|
359
|
-
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
360
|
-
|
361
321
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
362
322
|
|
363
323
|
```python
|
@@ -280,26 +280,6 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
-
|
285
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
-
---
|
287
|
-
|
288
|
-
# IAM policy for Service Directory Service
|
289
|
-
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
290
|
-
|
291
|
-
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
292
|
-
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
293
|
-
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
294
|
-
|
295
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
-
|
297
|
-
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
298
|
-
|
299
|
-
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
300
|
-
|
301
|
-
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
-
|
303
283
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
304
284
|
|
305
285
|
```python
|
@@ -453,26 +433,6 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
453
433
|
member="user:jane@example.com")
|
454
434
|
```
|
455
435
|
|
456
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
-
|
458
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
-
---
|
460
|
-
|
461
|
-
# IAM policy for Service Directory Service
|
462
|
-
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
463
|
-
|
464
|
-
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
465
|
-
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
466
|
-
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
467
|
-
|
468
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
-
|
470
|
-
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
471
|
-
|
472
|
-
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
473
|
-
|
474
|
-
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
-
|
476
436
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
477
437
|
|
478
438
|
```python
|
@@ -280,26 +280,6 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
-
|
285
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
-
---
|
287
|
-
|
288
|
-
# IAM policy for Service Directory Service
|
289
|
-
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
290
|
-
|
291
|
-
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
292
|
-
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
293
|
-
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
294
|
-
|
295
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
-
|
297
|
-
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
298
|
-
|
299
|
-
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
300
|
-
|
301
|
-
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
-
|
303
283
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
304
284
|
|
305
285
|
```python
|
@@ -453,26 +433,6 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
453
433
|
member="user:jane@example.com")
|
454
434
|
```
|
455
435
|
|
456
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
-
|
458
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
-
---
|
460
|
-
|
461
|
-
# IAM policy for Service Directory Service
|
462
|
-
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
463
|
-
|
464
|
-
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
465
|
-
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
466
|
-
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
467
|
-
|
468
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
-
|
470
|
-
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
471
|
-
|
472
|
-
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
473
|
-
|
474
|
-
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
-
|
476
436
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
477
437
|
|
478
438
|
```python
|
@@ -177,26 +177,6 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
-
|
182
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
-
---
|
184
|
-
|
185
|
-
# IAM policy for Service Directory Service
|
186
|
-
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
187
|
-
|
188
|
-
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
189
|
-
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
190
|
-
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
191
|
-
|
192
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
-
|
194
|
-
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
195
|
-
|
196
|
-
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
197
|
-
|
198
|
-
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
-
|
200
180
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
201
181
|
|
202
182
|
```python
|
@@ -338,26 +318,6 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
338
318
|
member="user:jane@example.com")
|
339
319
|
```
|
340
320
|
|
341
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
342
|
-
|
343
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
344
|
-
---
|
345
|
-
|
346
|
-
# IAM policy for Service Directory Service
|
347
|
-
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
348
|
-
|
349
|
-
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
350
|
-
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
351
|
-
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
352
|
-
|
353
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
354
|
-
|
355
|
-
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
356
|
-
|
357
|
-
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
358
|
-
|
359
|
-
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
360
|
-
|
361
321
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
362
322
|
|
363
323
|
```python
|
@@ -319,25 +319,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud Source Repositories Repository
|
327
|
-
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
330
|
-
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
331
|
-
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
336
|
-
|
337
|
-
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## sourcerepo.RepositoryIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -497,25 +478,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
497
478
|
member="user:jane@example.com")
|
498
479
|
```
|
499
480
|
|
500
|
-
## This resource supports User Project Overrides.
|
501
|
-
|
502
|
-
-
|
503
|
-
|
504
|
-
# IAM policy for Cloud Source Repositories Repository
|
505
|
-
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
506
|
-
|
507
|
-
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
508
|
-
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
509
|
-
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
510
|
-
|
511
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
512
|
-
|
513
|
-
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
514
|
-
|
515
|
-
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
516
|
-
|
517
|
-
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
518
|
-
|
519
481
|
## sourcerepo.RepositoryIamPolicy
|
520
482
|
|
521
483
|
```python
|
@@ -319,25 +319,6 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud Source Repositories Repository
|
327
|
-
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
330
|
-
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
331
|
-
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
336
|
-
|
337
|
-
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## sourcerepo.RepositoryIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -497,25 +478,6 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
497
478
|
member="user:jane@example.com")
|
498
479
|
```
|
499
480
|
|
500
|
-
## This resource supports User Project Overrides.
|
501
|
-
|
502
|
-
-
|
503
|
-
|
504
|
-
# IAM policy for Cloud Source Repositories Repository
|
505
|
-
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
506
|
-
|
507
|
-
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
508
|
-
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
509
|
-
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
510
|
-
|
511
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
512
|
-
|
513
|
-
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
514
|
-
|
515
|
-
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
516
|
-
|
517
|
-
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
518
|
-
|
519
481
|
## sourcerepo.RepositoryIamPolicy
|
520
482
|
|
521
483
|
```python
|
@@ -216,25 +216,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
-
## This resource supports User Project Overrides.
|
220
|
-
|
221
|
-
-
|
222
|
-
|
223
|
-
# IAM policy for Cloud Source Repositories Repository
|
224
|
-
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
225
|
-
|
226
|
-
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
227
|
-
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
228
|
-
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
229
|
-
|
230
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
-
|
232
|
-
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
233
|
-
|
234
|
-
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
235
|
-
|
236
|
-
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
-
|
238
219
|
## sourcerepo.RepositoryIamPolicy
|
239
220
|
|
240
221
|
```python
|
@@ -382,25 +363,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
382
363
|
member="user:jane@example.com")
|
383
364
|
```
|
384
365
|
|
385
|
-
## This resource supports User Project Overrides.
|
386
|
-
|
387
|
-
-
|
388
|
-
|
389
|
-
# IAM policy for Cloud Source Repositories Repository
|
390
|
-
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
391
|
-
|
392
|
-
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
393
|
-
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
394
|
-
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
395
|
-
|
396
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
397
|
-
|
398
|
-
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
399
|
-
|
400
|
-
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
401
|
-
|
402
|
-
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
403
|
-
|
404
366
|
## sourcerepo.RepositoryIamPolicy
|
405
367
|
|
406
368
|
```python
|
@@ -407,6 +407,43 @@ class DatabaseIAMBinding(pulumi.CustomResource):
|
|
407
407
|
})
|
408
408
|
```
|
409
409
|
|
410
|
+
## spanner.DatabaseIAMPolicy
|
411
|
+
|
412
|
+
```python
|
413
|
+
import pulumi
|
414
|
+
import pulumi_gcp as gcp
|
415
|
+
|
416
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
417
|
+
"role": "roles/editor",
|
418
|
+
"members": ["user:jane@example.com"],
|
419
|
+
}])
|
420
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
421
|
+
instance="your-instance-name",
|
422
|
+
database="your-database-name",
|
423
|
+
policy_data=admin.policy_data)
|
424
|
+
```
|
425
|
+
|
426
|
+
With IAM Conditions:
|
427
|
+
|
428
|
+
```python
|
429
|
+
import pulumi
|
430
|
+
import pulumi_gcp as gcp
|
431
|
+
|
432
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
433
|
+
"role": "roles/editor",
|
434
|
+
"members": ["user:jane@example.com"],
|
435
|
+
"condition": {
|
436
|
+
"title": "My Role",
|
437
|
+
"description": "Grant permissions on my_role",
|
438
|
+
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
439
|
+
},
|
440
|
+
}])
|
441
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
442
|
+
instance="your-instance-name",
|
443
|
+
database="your-database-name",
|
444
|
+
policy_data=admin.policy_data)
|
445
|
+
```
|
446
|
+
|
410
447
|
## spanner.DatabaseIAMBinding
|
411
448
|
|
412
449
|
```python
|
@@ -634,6 +671,43 @@ class DatabaseIAMBinding(pulumi.CustomResource):
|
|
634
671
|
})
|
635
672
|
```
|
636
673
|
|
674
|
+
## spanner.DatabaseIAMPolicy
|
675
|
+
|
676
|
+
```python
|
677
|
+
import pulumi
|
678
|
+
import pulumi_gcp as gcp
|
679
|
+
|
680
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
681
|
+
"role": "roles/editor",
|
682
|
+
"members": ["user:jane@example.com"],
|
683
|
+
}])
|
684
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
685
|
+
instance="your-instance-name",
|
686
|
+
database="your-database-name",
|
687
|
+
policy_data=admin.policy_data)
|
688
|
+
```
|
689
|
+
|
690
|
+
With IAM Conditions:
|
691
|
+
|
692
|
+
```python
|
693
|
+
import pulumi
|
694
|
+
import pulumi_gcp as gcp
|
695
|
+
|
696
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
697
|
+
"role": "roles/editor",
|
698
|
+
"members": ["user:jane@example.com"],
|
699
|
+
"condition": {
|
700
|
+
"title": "My Role",
|
701
|
+
"description": "Grant permissions on my_role",
|
702
|
+
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
703
|
+
},
|
704
|
+
}])
|
705
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
706
|
+
instance="your-instance-name",
|
707
|
+
database="your-database-name",
|
708
|
+
policy_data=admin.policy_data)
|
709
|
+
```
|
710
|
+
|
637
711
|
## spanner.DatabaseIAMBinding
|
638
712
|
|
639
713
|
```python
|