pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -407,6 +407,43 @@ class DatabaseIAMMember(pulumi.CustomResource):
|
|
407
407
|
})
|
408
408
|
```
|
409
409
|
|
410
|
+
## spanner.DatabaseIAMPolicy
|
411
|
+
|
412
|
+
```python
|
413
|
+
import pulumi
|
414
|
+
import pulumi_gcp as gcp
|
415
|
+
|
416
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
417
|
+
"role": "roles/editor",
|
418
|
+
"members": ["user:jane@example.com"],
|
419
|
+
}])
|
420
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
421
|
+
instance="your-instance-name",
|
422
|
+
database="your-database-name",
|
423
|
+
policy_data=admin.policy_data)
|
424
|
+
```
|
425
|
+
|
426
|
+
With IAM Conditions:
|
427
|
+
|
428
|
+
```python
|
429
|
+
import pulumi
|
430
|
+
import pulumi_gcp as gcp
|
431
|
+
|
432
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
433
|
+
"role": "roles/editor",
|
434
|
+
"members": ["user:jane@example.com"],
|
435
|
+
"condition": {
|
436
|
+
"title": "My Role",
|
437
|
+
"description": "Grant permissions on my_role",
|
438
|
+
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
439
|
+
},
|
440
|
+
}])
|
441
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
442
|
+
instance="your-instance-name",
|
443
|
+
database="your-database-name",
|
444
|
+
policy_data=admin.policy_data)
|
445
|
+
```
|
446
|
+
|
410
447
|
## spanner.DatabaseIAMBinding
|
411
448
|
|
412
449
|
```python
|
@@ -634,6 +671,43 @@ class DatabaseIAMMember(pulumi.CustomResource):
|
|
634
671
|
})
|
635
672
|
```
|
636
673
|
|
674
|
+
## spanner.DatabaseIAMPolicy
|
675
|
+
|
676
|
+
```python
|
677
|
+
import pulumi
|
678
|
+
import pulumi_gcp as gcp
|
679
|
+
|
680
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
681
|
+
"role": "roles/editor",
|
682
|
+
"members": ["user:jane@example.com"],
|
683
|
+
}])
|
684
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
685
|
+
instance="your-instance-name",
|
686
|
+
database="your-database-name",
|
687
|
+
policy_data=admin.policy_data)
|
688
|
+
```
|
689
|
+
|
690
|
+
With IAM Conditions:
|
691
|
+
|
692
|
+
```python
|
693
|
+
import pulumi
|
694
|
+
import pulumi_gcp as gcp
|
695
|
+
|
696
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
697
|
+
"role": "roles/editor",
|
698
|
+
"members": ["user:jane@example.com"],
|
699
|
+
"condition": {
|
700
|
+
"title": "My Role",
|
701
|
+
"description": "Grant permissions on my_role",
|
702
|
+
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
703
|
+
},
|
704
|
+
}])
|
705
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
706
|
+
instance="your-instance-name",
|
707
|
+
database="your-database-name",
|
708
|
+
policy_data=admin.policy_data)
|
709
|
+
```
|
710
|
+
|
637
711
|
## spanner.DatabaseIAMBinding
|
638
712
|
|
639
713
|
```python
|
@@ -304,6 +304,43 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
|
|
304
304
|
})
|
305
305
|
```
|
306
306
|
|
307
|
+
## spanner.DatabaseIAMPolicy
|
308
|
+
|
309
|
+
```python
|
310
|
+
import pulumi
|
311
|
+
import pulumi_gcp as gcp
|
312
|
+
|
313
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
314
|
+
"role": "roles/editor",
|
315
|
+
"members": ["user:jane@example.com"],
|
316
|
+
}])
|
317
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
318
|
+
instance="your-instance-name",
|
319
|
+
database="your-database-name",
|
320
|
+
policy_data=admin.policy_data)
|
321
|
+
```
|
322
|
+
|
323
|
+
With IAM Conditions:
|
324
|
+
|
325
|
+
```python
|
326
|
+
import pulumi
|
327
|
+
import pulumi_gcp as gcp
|
328
|
+
|
329
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
330
|
+
"role": "roles/editor",
|
331
|
+
"members": ["user:jane@example.com"],
|
332
|
+
"condition": {
|
333
|
+
"title": "My Role",
|
334
|
+
"description": "Grant permissions on my_role",
|
335
|
+
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
336
|
+
},
|
337
|
+
}])
|
338
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
339
|
+
instance="your-instance-name",
|
340
|
+
database="your-database-name",
|
341
|
+
policy_data=admin.policy_data)
|
342
|
+
```
|
343
|
+
|
307
344
|
## spanner.DatabaseIAMBinding
|
308
345
|
|
309
346
|
```python
|
@@ -520,6 +557,43 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
|
|
520
557
|
})
|
521
558
|
```
|
522
559
|
|
560
|
+
## spanner.DatabaseIAMPolicy
|
561
|
+
|
562
|
+
```python
|
563
|
+
import pulumi
|
564
|
+
import pulumi_gcp as gcp
|
565
|
+
|
566
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
567
|
+
"role": "roles/editor",
|
568
|
+
"members": ["user:jane@example.com"],
|
569
|
+
}])
|
570
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
571
|
+
instance="your-instance-name",
|
572
|
+
database="your-database-name",
|
573
|
+
policy_data=admin.policy_data)
|
574
|
+
```
|
575
|
+
|
576
|
+
With IAM Conditions:
|
577
|
+
|
578
|
+
```python
|
579
|
+
import pulumi
|
580
|
+
import pulumi_gcp as gcp
|
581
|
+
|
582
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
583
|
+
"role": "roles/editor",
|
584
|
+
"members": ["user:jane@example.com"],
|
585
|
+
"condition": {
|
586
|
+
"title": "My Role",
|
587
|
+
"description": "Grant permissions on my_role",
|
588
|
+
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
589
|
+
},
|
590
|
+
}])
|
591
|
+
database = gcp.spanner.DatabaseIAMPolicy("database",
|
592
|
+
instance="your-instance-name",
|
593
|
+
database="your-database-name",
|
594
|
+
policy_data=admin.policy_data)
|
595
|
+
```
|
596
|
+
|
523
597
|
## spanner.DatabaseIAMBinding
|
524
598
|
|
525
599
|
```python
|
@@ -303,6 +303,21 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
303
303
|
member="user:jane@example.com")
|
304
304
|
```
|
305
305
|
|
306
|
+
## spanner.InstanceIAMPolicy
|
307
|
+
|
308
|
+
```python
|
309
|
+
import pulumi
|
310
|
+
import pulumi_gcp as gcp
|
311
|
+
|
312
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
313
|
+
"role": "roles/editor",
|
314
|
+
"members": ["user:jane@example.com"],
|
315
|
+
}])
|
316
|
+
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
317
|
+
instance="your-instance-name",
|
318
|
+
policy_data=admin.policy_data)
|
319
|
+
```
|
320
|
+
|
306
321
|
## spanner.InstanceIAMBinding
|
307
322
|
|
308
323
|
```python
|
@@ -429,6 +444,21 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
429
444
|
member="user:jane@example.com")
|
430
445
|
```
|
431
446
|
|
447
|
+
## spanner.InstanceIAMPolicy
|
448
|
+
|
449
|
+
```python
|
450
|
+
import pulumi
|
451
|
+
import pulumi_gcp as gcp
|
452
|
+
|
453
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
454
|
+
"role": "roles/editor",
|
455
|
+
"members": ["user:jane@example.com"],
|
456
|
+
}])
|
457
|
+
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
458
|
+
instance="your-instance-name",
|
459
|
+
policy_data=admin.policy_data)
|
460
|
+
```
|
461
|
+
|
432
462
|
## spanner.InstanceIAMBinding
|
433
463
|
|
434
464
|
```python
|
@@ -303,6 +303,21 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
303
303
|
member="user:jane@example.com")
|
304
304
|
```
|
305
305
|
|
306
|
+
## spanner.InstanceIAMPolicy
|
307
|
+
|
308
|
+
```python
|
309
|
+
import pulumi
|
310
|
+
import pulumi_gcp as gcp
|
311
|
+
|
312
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
313
|
+
"role": "roles/editor",
|
314
|
+
"members": ["user:jane@example.com"],
|
315
|
+
}])
|
316
|
+
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
317
|
+
instance="your-instance-name",
|
318
|
+
policy_data=admin.policy_data)
|
319
|
+
```
|
320
|
+
|
306
321
|
## spanner.InstanceIAMBinding
|
307
322
|
|
308
323
|
```python
|
@@ -429,6 +444,21 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
429
444
|
member="user:jane@example.com")
|
430
445
|
```
|
431
446
|
|
447
|
+
## spanner.InstanceIAMPolicy
|
448
|
+
|
449
|
+
```python
|
450
|
+
import pulumi
|
451
|
+
import pulumi_gcp as gcp
|
452
|
+
|
453
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
454
|
+
"role": "roles/editor",
|
455
|
+
"members": ["user:jane@example.com"],
|
456
|
+
}])
|
457
|
+
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
458
|
+
instance="your-instance-name",
|
459
|
+
policy_data=admin.policy_data)
|
460
|
+
```
|
461
|
+
|
432
462
|
## spanner.InstanceIAMBinding
|
433
463
|
|
434
464
|
```python
|
@@ -212,6 +212,21 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
212
212
|
member="user:jane@example.com")
|
213
213
|
```
|
214
214
|
|
215
|
+
## spanner.InstanceIAMPolicy
|
216
|
+
|
217
|
+
```python
|
218
|
+
import pulumi
|
219
|
+
import pulumi_gcp as gcp
|
220
|
+
|
221
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
222
|
+
"role": "roles/editor",
|
223
|
+
"members": ["user:jane@example.com"],
|
224
|
+
}])
|
225
|
+
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
226
|
+
instance="your-instance-name",
|
227
|
+
policy_data=admin.policy_data)
|
228
|
+
```
|
229
|
+
|
215
230
|
## spanner.InstanceIAMBinding
|
216
231
|
|
217
232
|
```python
|
@@ -329,6 +344,21 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
329
344
|
member="user:jane@example.com")
|
330
345
|
```
|
331
346
|
|
347
|
+
## spanner.InstanceIAMPolicy
|
348
|
+
|
349
|
+
```python
|
350
|
+
import pulumi
|
351
|
+
import pulumi_gcp as gcp
|
352
|
+
|
353
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
354
|
+
"role": "roles/editor",
|
355
|
+
"members": ["user:jane@example.com"],
|
356
|
+
}])
|
357
|
+
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
358
|
+
instance="your-instance-name",
|
359
|
+
policy_data=admin.policy_data)
|
360
|
+
```
|
361
|
+
|
332
362
|
## spanner.InstanceIAMBinding
|
333
363
|
|
334
364
|
```python
|
@@ -345,27 +345,6 @@ class BucketIAMBinding(pulumi.CustomResource):
|
|
345
345
|
})
|
346
346
|
```
|
347
347
|
|
348
|
-
## This resource supports User Project Overrides.
|
349
|
-
|
350
|
-
-
|
351
|
-
|
352
|
-
# IAM policy for Cloud Storage Bucket
|
353
|
-
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
354
|
-
|
355
|
-
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
356
|
-
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
357
|
-
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
358
|
-
|
359
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
360
|
-
|
361
|
-
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
362
|
-
|
363
|
-
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
364
|
-
|
365
|
-
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
366
|
-
|
367
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
368
|
-
|
369
348
|
## storage.BucketIAMPolicy
|
370
349
|
|
371
350
|
```python
|
@@ -625,27 +604,6 @@ class BucketIAMBinding(pulumi.CustomResource):
|
|
625
604
|
})
|
626
605
|
```
|
627
606
|
|
628
|
-
## This resource supports User Project Overrides.
|
629
|
-
|
630
|
-
-
|
631
|
-
|
632
|
-
# IAM policy for Cloud Storage Bucket
|
633
|
-
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
634
|
-
|
635
|
-
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
636
|
-
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
637
|
-
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
638
|
-
|
639
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
640
|
-
|
641
|
-
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
642
|
-
|
643
|
-
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
644
|
-
|
645
|
-
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
646
|
-
|
647
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
648
|
-
|
649
607
|
## storage.BucketIAMPolicy
|
650
608
|
|
651
609
|
```python
|
@@ -345,27 +345,6 @@ class BucketIAMMember(pulumi.CustomResource):
|
|
345
345
|
})
|
346
346
|
```
|
347
347
|
|
348
|
-
## This resource supports User Project Overrides.
|
349
|
-
|
350
|
-
-
|
351
|
-
|
352
|
-
# IAM policy for Cloud Storage Bucket
|
353
|
-
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
354
|
-
|
355
|
-
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
356
|
-
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
357
|
-
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
358
|
-
|
359
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
360
|
-
|
361
|
-
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
362
|
-
|
363
|
-
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
364
|
-
|
365
|
-
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
366
|
-
|
367
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
368
|
-
|
369
348
|
## storage.BucketIAMPolicy
|
370
349
|
|
371
350
|
```python
|
@@ -625,27 +604,6 @@ class BucketIAMMember(pulumi.CustomResource):
|
|
625
604
|
})
|
626
605
|
```
|
627
606
|
|
628
|
-
## This resource supports User Project Overrides.
|
629
|
-
|
630
|
-
-
|
631
|
-
|
632
|
-
# IAM policy for Cloud Storage Bucket
|
633
|
-
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
634
|
-
|
635
|
-
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
636
|
-
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
637
|
-
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
638
|
-
|
639
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
640
|
-
|
641
|
-
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
642
|
-
|
643
|
-
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
644
|
-
|
645
|
-
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
646
|
-
|
647
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
648
|
-
|
649
607
|
## storage.BucketIAMPolicy
|
650
608
|
|
651
609
|
```python
|
@@ -230,27 +230,6 @@ class BucketIAMPolicy(pulumi.CustomResource):
|
|
230
230
|
})
|
231
231
|
```
|
232
232
|
|
233
|
-
## This resource supports User Project Overrides.
|
234
|
-
|
235
|
-
-
|
236
|
-
|
237
|
-
# IAM policy for Cloud Storage Bucket
|
238
|
-
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
239
|
-
|
240
|
-
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
241
|
-
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
242
|
-
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
243
|
-
|
244
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
245
|
-
|
246
|
-
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
247
|
-
|
248
|
-
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
249
|
-
|
250
|
-
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
251
|
-
|
252
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
253
|
-
|
254
233
|
## storage.BucketIAMPolicy
|
255
234
|
|
256
235
|
```python
|
@@ -496,27 +475,6 @@ class BucketIAMPolicy(pulumi.CustomResource):
|
|
496
475
|
})
|
497
476
|
```
|
498
477
|
|
499
|
-
## This resource supports User Project Overrides.
|
500
|
-
|
501
|
-
-
|
502
|
-
|
503
|
-
# IAM policy for Cloud Storage Bucket
|
504
|
-
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
505
|
-
|
506
|
-
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
507
|
-
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
508
|
-
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
509
|
-
|
510
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
511
|
-
|
512
|
-
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
513
|
-
|
514
|
-
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
515
|
-
|
516
|
-
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
517
|
-
|
518
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
519
|
-
|
520
478
|
## storage.BucketIAMPolicy
|
521
479
|
|
522
480
|
```python
|
@@ -383,28 +383,6 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
|
|
383
383
|
})
|
384
384
|
```
|
385
385
|
|
386
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
387
|
-
|
388
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
389
|
-
---
|
390
|
-
|
391
|
-
# IAM policy for Cloud Storage ManagedFolder
|
392
|
-
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
393
|
-
|
394
|
-
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
395
|
-
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
396
|
-
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
397
|
-
|
398
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
-
|
400
|
-
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
401
|
-
|
402
|
-
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
403
|
-
|
404
|
-
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
-
|
406
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
407
|
-
|
408
386
|
## storage.ManagedFolderIamPolicy
|
409
387
|
|
410
388
|
```python
|
@@ -677,28 +655,6 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
|
|
677
655
|
})
|
678
656
|
```
|
679
657
|
|
680
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
681
|
-
|
682
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
683
|
-
---
|
684
|
-
|
685
|
-
# IAM policy for Cloud Storage ManagedFolder
|
686
|
-
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
687
|
-
|
688
|
-
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
689
|
-
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
690
|
-
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
691
|
-
|
692
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
693
|
-
|
694
|
-
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
695
|
-
|
696
|
-
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
697
|
-
|
698
|
-
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
699
|
-
|
700
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
701
|
-
|
702
658
|
## storage.ManagedFolderIamPolicy
|
703
659
|
|
704
660
|
```python
|
@@ -383,28 +383,6 @@ class ManagedFolderIamMember(pulumi.CustomResource):
|
|
383
383
|
})
|
384
384
|
```
|
385
385
|
|
386
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
387
|
-
|
388
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
389
|
-
---
|
390
|
-
|
391
|
-
# IAM policy for Cloud Storage ManagedFolder
|
392
|
-
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
393
|
-
|
394
|
-
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
395
|
-
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
396
|
-
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
397
|
-
|
398
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
-
|
400
|
-
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
401
|
-
|
402
|
-
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
403
|
-
|
404
|
-
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
-
|
406
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
407
|
-
|
408
386
|
## storage.ManagedFolderIamPolicy
|
409
387
|
|
410
388
|
```python
|
@@ -677,28 +655,6 @@ class ManagedFolderIamMember(pulumi.CustomResource):
|
|
677
655
|
})
|
678
656
|
```
|
679
657
|
|
680
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
681
|
-
|
682
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
683
|
-
---
|
684
|
-
|
685
|
-
# IAM policy for Cloud Storage ManagedFolder
|
686
|
-
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
687
|
-
|
688
|
-
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
689
|
-
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
690
|
-
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
691
|
-
|
692
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
693
|
-
|
694
|
-
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
695
|
-
|
696
|
-
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
697
|
-
|
698
|
-
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
699
|
-
|
700
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
701
|
-
|
702
658
|
## storage.ManagedFolderIamPolicy
|
703
659
|
|
704
660
|
```python
|
@@ -268,28 +268,6 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
|
|
268
268
|
})
|
269
269
|
```
|
270
270
|
|
271
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
272
|
-
|
273
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
274
|
-
---
|
275
|
-
|
276
|
-
# IAM policy for Cloud Storage ManagedFolder
|
277
|
-
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
278
|
-
|
279
|
-
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
280
|
-
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
281
|
-
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
282
|
-
|
283
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
284
|
-
|
285
|
-
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
286
|
-
|
287
|
-
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
288
|
-
|
289
|
-
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
290
|
-
|
291
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
292
|
-
|
293
271
|
## storage.ManagedFolderIamPolicy
|
294
272
|
|
295
273
|
```python
|
@@ -548,28 +526,6 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
|
|
548
526
|
})
|
549
527
|
```
|
550
528
|
|
551
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
552
|
-
|
553
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
554
|
-
---
|
555
|
-
|
556
|
-
# IAM policy for Cloud Storage ManagedFolder
|
557
|
-
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
558
|
-
|
559
|
-
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
560
|
-
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
561
|
-
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
562
|
-
|
563
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
564
|
-
|
565
|
-
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
566
|
-
|
567
|
-
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
568
|
-
|
569
|
-
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
570
|
-
|
571
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
572
|
-
|
573
529
|
## storage.ManagedFolderIamPolicy
|
574
530
|
|
575
531
|
```python
|