pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -319,25 +319,6 @@ class AttestorIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Binary Authorization Attestor
|
327
|
-
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
330
|
-
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
331
|
-
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
336
|
-
|
337
|
-
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## binaryauthorization.AttestorIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class AttestorIamBinding(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Binary Authorization Attestor
|
507
|
-
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
510
|
-
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
511
|
-
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
516
|
-
|
517
|
-
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## binaryauthorization.AttestorIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -319,25 +319,6 @@ class AttestorIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Binary Authorization Attestor
|
327
|
-
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
330
|
-
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
331
|
-
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
336
|
-
|
337
|
-
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## binaryauthorization.AttestorIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class AttestorIamMember(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Binary Authorization Attestor
|
507
|
-
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
510
|
-
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
511
|
-
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
516
|
-
|
517
|
-
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## binaryauthorization.AttestorIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -216,25 +216,6 @@ class AttestorIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
-
## This resource supports User Project Overrides.
|
220
|
-
|
221
|
-
-
|
222
|
-
|
223
|
-
# IAM policy for Binary Authorization Attestor
|
224
|
-
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
225
|
-
|
226
|
-
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
227
|
-
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
228
|
-
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
229
|
-
|
230
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
-
|
232
|
-
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
233
|
-
|
234
|
-
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
235
|
-
|
236
|
-
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
-
|
238
219
|
## binaryauthorization.AttestorIamPolicy
|
239
220
|
|
240
221
|
```python
|
@@ -384,25 +365,6 @@ class AttestorIamPolicy(pulumi.CustomResource):
|
|
384
365
|
member="user:jane@example.com")
|
385
366
|
```
|
386
367
|
|
387
|
-
## This resource supports User Project Overrides.
|
388
|
-
|
389
|
-
-
|
390
|
-
|
391
|
-
# IAM policy for Binary Authorization Attestor
|
392
|
-
Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
|
393
|
-
|
394
|
-
* `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
|
395
|
-
* `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
|
396
|
-
* `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
|
397
|
-
|
398
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
-
|
400
|
-
* `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
|
401
|
-
|
402
|
-
> **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
|
403
|
-
|
404
|
-
> **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
-
|
406
368
|
## binaryauthorization.AttestorIamPolicy
|
407
369
|
|
408
370
|
```python
|
@@ -431,27 +431,6 @@ class CaPoolIamBinding(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
-
## This resource supports User Project Overrides.
|
435
|
-
|
436
|
-
-
|
437
|
-
|
438
|
-
# IAM policy for Certificate Authority Service CaPool
|
439
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
440
|
-
|
441
|
-
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
442
|
-
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
443
|
-
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
444
|
-
|
445
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
-
|
447
|
-
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
448
|
-
|
449
|
-
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
450
|
-
|
451
|
-
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
-
|
453
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
-
|
455
434
|
## certificateauthority.CaPoolIamPolicy
|
456
435
|
|
457
436
|
```python
|
@@ -720,27 +699,6 @@ class CaPoolIamBinding(pulumi.CustomResource):
|
|
720
699
|
})
|
721
700
|
```
|
722
701
|
|
723
|
-
## This resource supports User Project Overrides.
|
724
|
-
|
725
|
-
-
|
726
|
-
|
727
|
-
# IAM policy for Certificate Authority Service CaPool
|
728
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
729
|
-
|
730
|
-
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
731
|
-
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
732
|
-
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
733
|
-
|
734
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
735
|
-
|
736
|
-
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
737
|
-
|
738
|
-
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
739
|
-
|
740
|
-
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
741
|
-
|
742
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
743
|
-
|
744
702
|
## certificateauthority.CaPoolIamPolicy
|
745
703
|
|
746
704
|
```python
|
@@ -431,27 +431,6 @@ class CaPoolIamMember(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
-
## This resource supports User Project Overrides.
|
435
|
-
|
436
|
-
-
|
437
|
-
|
438
|
-
# IAM policy for Certificate Authority Service CaPool
|
439
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
440
|
-
|
441
|
-
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
442
|
-
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
443
|
-
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
444
|
-
|
445
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
-
|
447
|
-
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
448
|
-
|
449
|
-
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
450
|
-
|
451
|
-
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
-
|
453
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
-
|
455
434
|
## certificateauthority.CaPoolIamPolicy
|
456
435
|
|
457
436
|
```python
|
@@ -720,27 +699,6 @@ class CaPoolIamMember(pulumi.CustomResource):
|
|
720
699
|
})
|
721
700
|
```
|
722
701
|
|
723
|
-
## This resource supports User Project Overrides.
|
724
|
-
|
725
|
-
-
|
726
|
-
|
727
|
-
# IAM policy for Certificate Authority Service CaPool
|
728
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
729
|
-
|
730
|
-
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
731
|
-
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
732
|
-
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
733
|
-
|
734
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
735
|
-
|
736
|
-
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
737
|
-
|
738
|
-
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
739
|
-
|
740
|
-
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
741
|
-
|
742
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
743
|
-
|
744
702
|
## certificateauthority.CaPoolIamPolicy
|
745
703
|
|
746
704
|
```python
|
@@ -316,27 +316,6 @@ class CaPoolIamPolicy(pulumi.CustomResource):
|
|
316
316
|
})
|
317
317
|
```
|
318
318
|
|
319
|
-
## This resource supports User Project Overrides.
|
320
|
-
|
321
|
-
-
|
322
|
-
|
323
|
-
# IAM policy for Certificate Authority Service CaPool
|
324
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
325
|
-
|
326
|
-
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
327
|
-
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
328
|
-
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
329
|
-
|
330
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
331
|
-
|
332
|
-
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
333
|
-
|
334
|
-
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
335
|
-
|
336
|
-
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
337
|
-
|
338
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
339
|
-
|
340
319
|
## certificateauthority.CaPoolIamPolicy
|
341
320
|
|
342
321
|
```python
|
@@ -591,27 +570,6 @@ class CaPoolIamPolicy(pulumi.CustomResource):
|
|
591
570
|
})
|
592
571
|
```
|
593
572
|
|
594
|
-
## This resource supports User Project Overrides.
|
595
|
-
|
596
|
-
-
|
597
|
-
|
598
|
-
# IAM policy for Certificate Authority Service CaPool
|
599
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
|
600
|
-
|
601
|
-
* `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
|
602
|
-
* `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
|
603
|
-
* `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
|
604
|
-
|
605
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
606
|
-
|
607
|
-
* `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
|
608
|
-
|
609
|
-
> **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
|
610
|
-
|
611
|
-
> **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
|
612
|
-
|
613
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
614
|
-
|
615
573
|
## certificateauthority.CaPoolIamPolicy
|
616
574
|
|
617
575
|
```python
|
@@ -423,27 +423,6 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
|
|
423
423
|
})
|
424
424
|
```
|
425
425
|
|
426
|
-
## This resource supports User Project Overrides.
|
427
|
-
|
428
|
-
-
|
429
|
-
|
430
|
-
# IAM policy for Certificate Authority Service CertificateTemplate
|
431
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
432
|
-
|
433
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
434
|
-
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
435
|
-
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
436
|
-
|
437
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
438
|
-
|
439
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
440
|
-
|
441
|
-
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
442
|
-
|
443
|
-
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
444
|
-
|
445
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
446
|
-
|
447
426
|
## certificateauthority.CertificateTemplateIamPolicy
|
448
427
|
|
449
428
|
```python
|
@@ -710,27 +689,6 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
|
|
710
689
|
})
|
711
690
|
```
|
712
691
|
|
713
|
-
## This resource supports User Project Overrides.
|
714
|
-
|
715
|
-
-
|
716
|
-
|
717
|
-
# IAM policy for Certificate Authority Service CertificateTemplate
|
718
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
719
|
-
|
720
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
721
|
-
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
722
|
-
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
723
|
-
|
724
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
725
|
-
|
726
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
727
|
-
|
728
|
-
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
729
|
-
|
730
|
-
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
731
|
-
|
732
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
733
|
-
|
734
692
|
## certificateauthority.CertificateTemplateIamPolicy
|
735
693
|
|
736
694
|
```python
|
@@ -423,27 +423,6 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
|
|
423
423
|
})
|
424
424
|
```
|
425
425
|
|
426
|
-
## This resource supports User Project Overrides.
|
427
|
-
|
428
|
-
-
|
429
|
-
|
430
|
-
# IAM policy for Certificate Authority Service CertificateTemplate
|
431
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
432
|
-
|
433
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
434
|
-
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
435
|
-
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
436
|
-
|
437
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
438
|
-
|
439
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
440
|
-
|
441
|
-
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
442
|
-
|
443
|
-
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
444
|
-
|
445
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
446
|
-
|
447
426
|
## certificateauthority.CertificateTemplateIamPolicy
|
448
427
|
|
449
428
|
```python
|
@@ -710,27 +689,6 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
|
|
710
689
|
})
|
711
690
|
```
|
712
691
|
|
713
|
-
## This resource supports User Project Overrides.
|
714
|
-
|
715
|
-
-
|
716
|
-
|
717
|
-
# IAM policy for Certificate Authority Service CertificateTemplate
|
718
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
719
|
-
|
720
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
721
|
-
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
722
|
-
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
723
|
-
|
724
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
725
|
-
|
726
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
727
|
-
|
728
|
-
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
729
|
-
|
730
|
-
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
731
|
-
|
732
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
733
|
-
|
734
692
|
## certificateauthority.CertificateTemplateIamPolicy
|
735
693
|
|
736
694
|
```python
|
@@ -308,27 +308,6 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
|
|
308
308
|
})
|
309
309
|
```
|
310
310
|
|
311
|
-
## This resource supports User Project Overrides.
|
312
|
-
|
313
|
-
-
|
314
|
-
|
315
|
-
# IAM policy for Certificate Authority Service CertificateTemplate
|
316
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
317
|
-
|
318
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
319
|
-
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
320
|
-
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
321
|
-
|
322
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
323
|
-
|
324
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
325
|
-
|
326
|
-
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
327
|
-
|
328
|
-
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
329
|
-
|
330
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
331
|
-
|
332
311
|
## certificateauthority.CertificateTemplateIamPolicy
|
333
312
|
|
334
313
|
```python
|
@@ -581,27 +560,6 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
|
|
581
560
|
})
|
582
561
|
```
|
583
562
|
|
584
|
-
## This resource supports User Project Overrides.
|
585
|
-
|
586
|
-
-
|
587
|
-
|
588
|
-
# IAM policy for Certificate Authority Service CertificateTemplate
|
589
|
-
Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
|
590
|
-
|
591
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
|
592
|
-
* `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
|
593
|
-
* `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
|
594
|
-
|
595
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
596
|
-
|
597
|
-
* `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
|
598
|
-
|
599
|
-
> **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
|
600
|
-
|
601
|
-
> **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
602
|
-
|
603
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
604
|
-
|
605
563
|
## certificateauthority.CertificateTemplateIamPolicy
|
606
564
|
|
607
565
|
```python
|
@@ -364,25 +364,6 @@ class ConnectionIAMBinding(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
-
## This resource supports User Project Overrides.
|
368
|
-
|
369
|
-
-
|
370
|
-
|
371
|
-
# IAM policy for Cloud Build v2 Connection
|
372
|
-
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
373
|
-
|
374
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
375
|
-
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
376
|
-
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
377
|
-
|
378
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
-
|
380
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
381
|
-
|
382
|
-
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
383
|
-
|
384
|
-
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
385
|
-
|
386
367
|
## cloudbuildv2.ConnectionIAMPolicy
|
387
368
|
|
388
369
|
```python
|
@@ -555,25 +536,6 @@ class ConnectionIAMBinding(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Cloud Build v2 Connection
|
563
|
-
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
566
|
-
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
567
|
-
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
572
|
-
|
573
|
-
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## cloudbuildv2.ConnectionIAMPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -364,25 +364,6 @@ class ConnectionIAMMember(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
-
## This resource supports User Project Overrides.
|
368
|
-
|
369
|
-
-
|
370
|
-
|
371
|
-
# IAM policy for Cloud Build v2 Connection
|
372
|
-
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
373
|
-
|
374
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
375
|
-
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
376
|
-
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
377
|
-
|
378
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
-
|
380
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
381
|
-
|
382
|
-
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
383
|
-
|
384
|
-
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
385
|
-
|
386
367
|
## cloudbuildv2.ConnectionIAMPolicy
|
387
368
|
|
388
369
|
```python
|
@@ -555,25 +536,6 @@ class ConnectionIAMMember(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Cloud Build v2 Connection
|
563
|
-
Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
566
|
-
* `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
567
|
-
* `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
|
572
|
-
|
573
|
-
> **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## cloudbuildv2.ConnectionIAMPolicy
|
578
540
|
|
579
541
|
```python
|