pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -279,26 +279,6 @@ class TagKeyIamBinding(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
-
|
284
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
-
---
|
286
|
-
|
287
|
-
# IAM policy for Tags TagKey
|
288
|
-
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
289
|
-
|
290
|
-
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
291
|
-
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
292
|
-
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
293
|
-
|
294
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
-
|
296
|
-
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
297
|
-
|
298
|
-
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
299
|
-
|
300
|
-
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
-
|
302
282
|
## tags.TagKeyIamPolicy
|
303
283
|
|
304
284
|
```python
|
@@ -450,26 +430,6 @@ class TagKeyIamBinding(pulumi.CustomResource):
|
|
450
430
|
member="user:jane@example.com")
|
451
431
|
```
|
452
432
|
|
453
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
-
|
455
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
-
---
|
457
|
-
|
458
|
-
# IAM policy for Tags TagKey
|
459
|
-
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
460
|
-
|
461
|
-
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
462
|
-
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
463
|
-
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
464
|
-
|
465
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
-
|
467
|
-
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
468
|
-
|
469
|
-
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
470
|
-
|
471
|
-
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
-
|
473
433
|
## tags.TagKeyIamPolicy
|
474
434
|
|
475
435
|
```python
|
@@ -279,26 +279,6 @@ class TagKeyIamMember(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
-
|
284
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
-
---
|
286
|
-
|
287
|
-
# IAM policy for Tags TagKey
|
288
|
-
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
289
|
-
|
290
|
-
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
291
|
-
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
292
|
-
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
293
|
-
|
294
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
-
|
296
|
-
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
297
|
-
|
298
|
-
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
299
|
-
|
300
|
-
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
-
|
302
282
|
## tags.TagKeyIamPolicy
|
303
283
|
|
304
284
|
```python
|
@@ -450,26 +430,6 @@ class TagKeyIamMember(pulumi.CustomResource):
|
|
450
430
|
member="user:jane@example.com")
|
451
431
|
```
|
452
432
|
|
453
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
-
|
455
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
-
---
|
457
|
-
|
458
|
-
# IAM policy for Tags TagKey
|
459
|
-
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
460
|
-
|
461
|
-
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
462
|
-
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
463
|
-
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
464
|
-
|
465
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
-
|
467
|
-
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
468
|
-
|
469
|
-
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
470
|
-
|
471
|
-
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
-
|
473
433
|
## tags.TagKeyIamPolicy
|
474
434
|
|
475
435
|
```python
|
@@ -176,26 +176,6 @@ class TagKeyIamPolicy(pulumi.CustomResource):
|
|
176
176
|
member="user:jane@example.com")
|
177
177
|
```
|
178
178
|
|
179
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
180
|
-
|
181
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
182
|
-
---
|
183
|
-
|
184
|
-
# IAM policy for Tags TagKey
|
185
|
-
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
186
|
-
|
187
|
-
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
188
|
-
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
189
|
-
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
190
|
-
|
191
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
192
|
-
|
193
|
-
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
194
|
-
|
195
|
-
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
196
|
-
|
197
|
-
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
198
|
-
|
199
179
|
## tags.TagKeyIamPolicy
|
200
180
|
|
201
181
|
```python
|
@@ -335,26 +315,6 @@ class TagKeyIamPolicy(pulumi.CustomResource):
|
|
335
315
|
member="user:jane@example.com")
|
336
316
|
```
|
337
317
|
|
338
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
339
|
-
|
340
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
341
|
-
---
|
342
|
-
|
343
|
-
# IAM policy for Tags TagKey
|
344
|
-
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
345
|
-
|
346
|
-
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
347
|
-
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
348
|
-
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
349
|
-
|
350
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
351
|
-
|
352
|
-
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
353
|
-
|
354
|
-
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
355
|
-
|
356
|
-
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
357
|
-
|
358
318
|
## tags.TagKeyIamPolicy
|
359
319
|
|
360
320
|
```python
|
@@ -279,26 +279,6 @@ class TagValueIamBinding(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
-
|
284
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
-
---
|
286
|
-
|
287
|
-
# IAM policy for Tags TagValue
|
288
|
-
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
289
|
-
|
290
|
-
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
291
|
-
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
292
|
-
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
293
|
-
|
294
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
-
|
296
|
-
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
297
|
-
|
298
|
-
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
299
|
-
|
300
|
-
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
-
|
302
282
|
## tags.TagValueIamPolicy
|
303
283
|
|
304
284
|
```python
|
@@ -450,26 +430,6 @@ class TagValueIamBinding(pulumi.CustomResource):
|
|
450
430
|
member="user:jane@example.com")
|
451
431
|
```
|
452
432
|
|
453
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
-
|
455
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
-
---
|
457
|
-
|
458
|
-
# IAM policy for Tags TagValue
|
459
|
-
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
460
|
-
|
461
|
-
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
462
|
-
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
463
|
-
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
464
|
-
|
465
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
-
|
467
|
-
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
468
|
-
|
469
|
-
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
470
|
-
|
471
|
-
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
-
|
473
433
|
## tags.TagValueIamPolicy
|
474
434
|
|
475
435
|
```python
|
@@ -279,26 +279,6 @@ class TagValueIamMember(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
-
|
284
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
-
---
|
286
|
-
|
287
|
-
# IAM policy for Tags TagValue
|
288
|
-
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
289
|
-
|
290
|
-
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
291
|
-
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
292
|
-
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
293
|
-
|
294
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
-
|
296
|
-
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
297
|
-
|
298
|
-
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
299
|
-
|
300
|
-
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
-
|
302
282
|
## tags.TagValueIamPolicy
|
303
283
|
|
304
284
|
```python
|
@@ -450,26 +430,6 @@ class TagValueIamMember(pulumi.CustomResource):
|
|
450
430
|
member="user:jane@example.com")
|
451
431
|
```
|
452
432
|
|
453
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
-
|
455
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
-
---
|
457
|
-
|
458
|
-
# IAM policy for Tags TagValue
|
459
|
-
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
460
|
-
|
461
|
-
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
462
|
-
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
463
|
-
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
464
|
-
|
465
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
-
|
467
|
-
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
468
|
-
|
469
|
-
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
470
|
-
|
471
|
-
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
-
|
473
433
|
## tags.TagValueIamPolicy
|
474
434
|
|
475
435
|
```python
|
@@ -176,26 +176,6 @@ class TagValueIamPolicy(pulumi.CustomResource):
|
|
176
176
|
member="user:jane@example.com")
|
177
177
|
```
|
178
178
|
|
179
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
180
|
-
|
181
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
182
|
-
---
|
183
|
-
|
184
|
-
# IAM policy for Tags TagValue
|
185
|
-
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
186
|
-
|
187
|
-
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
188
|
-
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
189
|
-
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
190
|
-
|
191
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
192
|
-
|
193
|
-
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
194
|
-
|
195
|
-
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
196
|
-
|
197
|
-
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
198
|
-
|
199
179
|
## tags.TagValueIamPolicy
|
200
180
|
|
201
181
|
```python
|
@@ -335,26 +315,6 @@ class TagValueIamPolicy(pulumi.CustomResource):
|
|
335
315
|
member="user:jane@example.com")
|
336
316
|
```
|
337
317
|
|
338
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
339
|
-
|
340
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
341
|
-
---
|
342
|
-
|
343
|
-
# IAM policy for Tags TagValue
|
344
|
-
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
345
|
-
|
346
|
-
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
347
|
-
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
348
|
-
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
349
|
-
|
350
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
351
|
-
|
352
|
-
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
353
|
-
|
354
|
-
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
355
|
-
|
356
|
-
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
357
|
-
|
358
318
|
## tags.TagValueIamPolicy
|
359
319
|
|
360
320
|
```python
|