pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -273,27 +273,6 @@ class ImageIamPolicy(pulumi.CustomResource):
|
|
273
273
|
})
|
274
274
|
```
|
275
275
|
|
276
|
-
## This resource supports User Project Overrides.
|
277
|
-
|
278
|
-
-
|
279
|
-
|
280
|
-
# IAM policy for Compute Engine Image
|
281
|
-
Three different resources help you manage your IAM policy for Compute Engine Image. Each of these resources serves a different use case:
|
282
|
-
|
283
|
-
* `compute.ImageIamPolicy`: Authoritative. Sets the IAM policy for the image and replaces any existing policy already attached.
|
284
|
-
* `compute.ImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the image are preserved.
|
285
|
-
* `compute.ImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the image are preserved.
|
286
|
-
|
287
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
288
|
-
|
289
|
-
* `compute.ImageIamPolicy`: Retrieves the IAM policy for the image
|
290
|
-
|
291
|
-
> **Note:** `compute.ImageIamPolicy` **cannot** be used in conjunction with `compute.ImageIamBinding` and `compute.ImageIamMember` or they will fight over what your policy should be.
|
292
|
-
|
293
|
-
> **Note:** `compute.ImageIamBinding` resources **can be** used in conjunction with `compute.ImageIamMember` resources **only if** they do not grant privilege to the same role.
|
294
|
-
|
295
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
296
|
-
|
297
276
|
## compute.ImageIamPolicy
|
298
277
|
|
299
278
|
```python
|
@@ -555,27 +534,6 @@ class ImageIamPolicy(pulumi.CustomResource):
|
|
555
534
|
})
|
556
535
|
```
|
557
536
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Compute Engine Image
|
563
|
-
Three different resources help you manage your IAM policy for Compute Engine Image. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `compute.ImageIamPolicy`: Authoritative. Sets the IAM policy for the image and replaces any existing policy already attached.
|
566
|
-
* `compute.ImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the image are preserved.
|
567
|
-
* `compute.ImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the image are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `compute.ImageIamPolicy`: Retrieves the IAM policy for the image
|
572
|
-
|
573
|
-
> **Note:** `compute.ImageIamPolicy` **cannot** be used in conjunction with `compute.ImageIamBinding` and `compute.ImageIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `compute.ImageIamBinding` resources **can be** used in conjunction with `compute.ImageIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
578
|
-
|
579
537
|
## compute.ImageIamPolicy
|
580
538
|
|
581
539
|
```python
|
@@ -435,27 +435,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
435
435
|
})
|
436
436
|
```
|
437
437
|
|
438
|
-
## This resource supports User Project Overrides.
|
439
|
-
|
440
|
-
-
|
441
|
-
|
442
|
-
# IAM policy for Compute Engine Instance
|
443
|
-
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
444
|
-
|
445
|
-
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
446
|
-
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
447
|
-
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
448
|
-
|
449
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
-
|
451
|
-
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
452
|
-
|
453
|
-
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
454
|
-
|
455
|
-
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
456
|
-
|
457
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
458
|
-
|
459
438
|
## compute.InstanceIAMPolicy
|
460
439
|
|
461
440
|
```python
|
@@ -748,27 +727,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
748
727
|
})
|
749
728
|
```
|
750
729
|
|
751
|
-
## This resource supports User Project Overrides.
|
752
|
-
|
753
|
-
-
|
754
|
-
|
755
|
-
# IAM policy for Compute Engine Instance
|
756
|
-
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
757
|
-
|
758
|
-
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
759
|
-
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
760
|
-
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
761
|
-
|
762
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
763
|
-
|
764
|
-
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
765
|
-
|
766
|
-
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
767
|
-
|
768
|
-
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
769
|
-
|
770
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
771
|
-
|
772
730
|
## compute.InstanceIAMPolicy
|
773
731
|
|
774
732
|
```python
|
@@ -435,27 +435,6 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
435
435
|
})
|
436
436
|
```
|
437
437
|
|
438
|
-
## This resource supports User Project Overrides.
|
439
|
-
|
440
|
-
-
|
441
|
-
|
442
|
-
# IAM policy for Compute Engine Instance
|
443
|
-
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
444
|
-
|
445
|
-
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
446
|
-
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
447
|
-
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
448
|
-
|
449
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
-
|
451
|
-
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
452
|
-
|
453
|
-
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
454
|
-
|
455
|
-
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
456
|
-
|
457
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
458
|
-
|
459
438
|
## compute.InstanceIAMPolicy
|
460
439
|
|
461
440
|
```python
|
@@ -748,27 +727,6 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
748
727
|
})
|
749
728
|
```
|
750
729
|
|
751
|
-
## This resource supports User Project Overrides.
|
752
|
-
|
753
|
-
-
|
754
|
-
|
755
|
-
# IAM policy for Compute Engine Instance
|
756
|
-
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
757
|
-
|
758
|
-
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
759
|
-
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
760
|
-
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
761
|
-
|
762
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
763
|
-
|
764
|
-
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
765
|
-
|
766
|
-
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
767
|
-
|
768
|
-
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
769
|
-
|
770
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
771
|
-
|
772
730
|
## compute.InstanceIAMPolicy
|
773
731
|
|
774
732
|
```python
|
@@ -320,27 +320,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
320
320
|
})
|
321
321
|
```
|
322
322
|
|
323
|
-
## This resource supports User Project Overrides.
|
324
|
-
|
325
|
-
-
|
326
|
-
|
327
|
-
# IAM policy for Compute Engine Instance
|
328
|
-
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
329
|
-
|
330
|
-
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
331
|
-
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
332
|
-
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
333
|
-
|
334
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
335
|
-
|
336
|
-
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
337
|
-
|
338
|
-
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
339
|
-
|
340
|
-
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
341
|
-
|
342
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
343
|
-
|
344
323
|
## compute.InstanceIAMPolicy
|
345
324
|
|
346
325
|
```python
|
@@ -619,27 +598,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
619
598
|
})
|
620
599
|
```
|
621
600
|
|
622
|
-
## This resource supports User Project Overrides.
|
623
|
-
|
624
|
-
-
|
625
|
-
|
626
|
-
# IAM policy for Compute Engine Instance
|
627
|
-
Three different resources help you manage your IAM policy for Compute Engine Instance. Each of these resources serves a different use case:
|
628
|
-
|
629
|
-
* `compute.InstanceIAMPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
630
|
-
* `compute.InstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
631
|
-
* `compute.InstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
632
|
-
|
633
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
634
|
-
|
635
|
-
* `compute.InstanceIAMPolicy`: Retrieves the IAM policy for the instance
|
636
|
-
|
637
|
-
> **Note:** `compute.InstanceIAMPolicy` **cannot** be used in conjunction with `compute.InstanceIAMBinding` and `compute.InstanceIAMMember` or they will fight over what your policy should be.
|
638
|
-
|
639
|
-
> **Note:** `compute.InstanceIAMBinding` resources **can be** used in conjunction with `compute.InstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
640
|
-
|
641
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
642
|
-
|
643
601
|
## compute.InstanceIAMPolicy
|
644
602
|
|
645
603
|
```python
|
@@ -387,26 +387,6 @@ class MachineImageIamBinding(pulumi.CustomResource):
|
|
387
387
|
})
|
388
388
|
```
|
389
389
|
|
390
|
-
## This resource supports User Project Overrides.
|
391
|
-
|
392
|
-
-
|
393
|
-
|
394
|
-
# IAM policy for Compute Engine MachineImage
|
395
|
-
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
396
|
-
|
397
|
-
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
398
|
-
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
399
|
-
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
400
|
-
|
401
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
402
|
-
|
403
|
-
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
404
|
-
|
405
|
-
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
406
|
-
|
407
|
-
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
408
|
-
|
409
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
410
390
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
411
391
|
|
412
392
|
```python
|
@@ -681,26 +661,6 @@ class MachineImageIamBinding(pulumi.CustomResource):
|
|
681
661
|
})
|
682
662
|
```
|
683
663
|
|
684
|
-
## This resource supports User Project Overrides.
|
685
|
-
|
686
|
-
-
|
687
|
-
|
688
|
-
# IAM policy for Compute Engine MachineImage
|
689
|
-
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
690
|
-
|
691
|
-
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
692
|
-
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
693
|
-
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
694
|
-
|
695
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
696
|
-
|
697
|
-
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
698
|
-
|
699
|
-
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
700
|
-
|
701
|
-
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
702
|
-
|
703
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
704
664
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
705
665
|
|
706
666
|
```python
|
@@ -387,26 +387,6 @@ class MachineImageIamMember(pulumi.CustomResource):
|
|
387
387
|
})
|
388
388
|
```
|
389
389
|
|
390
|
-
## This resource supports User Project Overrides.
|
391
|
-
|
392
|
-
-
|
393
|
-
|
394
|
-
# IAM policy for Compute Engine MachineImage
|
395
|
-
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
396
|
-
|
397
|
-
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
398
|
-
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
399
|
-
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
400
|
-
|
401
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
402
|
-
|
403
|
-
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
404
|
-
|
405
|
-
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
406
|
-
|
407
|
-
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
408
|
-
|
409
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
410
390
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
411
391
|
|
412
392
|
```python
|
@@ -681,26 +661,6 @@ class MachineImageIamMember(pulumi.CustomResource):
|
|
681
661
|
})
|
682
662
|
```
|
683
663
|
|
684
|
-
## This resource supports User Project Overrides.
|
685
|
-
|
686
|
-
-
|
687
|
-
|
688
|
-
# IAM policy for Compute Engine MachineImage
|
689
|
-
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
690
|
-
|
691
|
-
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
692
|
-
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
693
|
-
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
694
|
-
|
695
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
696
|
-
|
697
|
-
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
698
|
-
|
699
|
-
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
700
|
-
|
701
|
-
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
702
|
-
|
703
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
704
664
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
705
665
|
|
706
666
|
```python
|
@@ -272,26 +272,6 @@ class MachineImageIamPolicy(pulumi.CustomResource):
|
|
272
272
|
})
|
273
273
|
```
|
274
274
|
|
275
|
-
## This resource supports User Project Overrides.
|
276
|
-
|
277
|
-
-
|
278
|
-
|
279
|
-
# IAM policy for Compute Engine MachineImage
|
280
|
-
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
281
|
-
|
282
|
-
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
283
|
-
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
284
|
-
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
285
|
-
|
286
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
287
|
-
|
288
|
-
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
289
|
-
|
290
|
-
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
291
|
-
|
292
|
-
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
293
|
-
|
294
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
295
275
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
296
276
|
|
297
277
|
```python
|
@@ -552,26 +532,6 @@ class MachineImageIamPolicy(pulumi.CustomResource):
|
|
552
532
|
})
|
553
533
|
```
|
554
534
|
|
555
|
-
## This resource supports User Project Overrides.
|
556
|
-
|
557
|
-
-
|
558
|
-
|
559
|
-
# IAM policy for Compute Engine MachineImage
|
560
|
-
Three different resources help you manage your IAM policy for Compute Engine MachineImage. Each of these resources serves a different use case:
|
561
|
-
|
562
|
-
* `compute.MachineImageIamPolicy`: Authoritative. Sets the IAM policy for the machineimage and replaces any existing policy already attached.
|
563
|
-
* `compute.MachineImageIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the machineimage are preserved.
|
564
|
-
* `compute.MachineImageIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the machineimage are preserved.
|
565
|
-
|
566
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
567
|
-
|
568
|
-
* `compute.MachineImageIamPolicy`: Retrieves the IAM policy for the machineimage
|
569
|
-
|
570
|
-
> **Note:** `compute.MachineImageIamPolicy` **cannot** be used in conjunction with `compute.MachineImageIamBinding` and `compute.MachineImageIamMember` or they will fight over what your policy should be.
|
571
|
-
|
572
|
-
> **Note:** `compute.MachineImageIamBinding` resources **can be** used in conjunction with `compute.MachineImageIamMember` resources **only if** they do not grant privilege to the same role.
|
573
|
-
|
574
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
575
535
|
## google\\_compute\\_machine\\_image\\_iam\\_policy
|
576
536
|
|
577
537
|
```python
|
@@ -364,25 +364,6 @@ class RegionDiskIamBinding(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
-
## This resource supports User Project Overrides.
|
368
|
-
|
369
|
-
-
|
370
|
-
|
371
|
-
# IAM policy for Compute Engine RegionDisk
|
372
|
-
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
373
|
-
|
374
|
-
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
375
|
-
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
376
|
-
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
377
|
-
|
378
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
-
|
380
|
-
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
381
|
-
|
382
|
-
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
383
|
-
|
384
|
-
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
-
|
386
367
|
## compute.RegionDiskIamPolicy
|
387
368
|
|
388
369
|
```python
|
@@ -555,25 +536,6 @@ class RegionDiskIamBinding(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Compute Engine RegionDisk
|
563
|
-
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
566
|
-
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
567
|
-
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
572
|
-
|
573
|
-
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## compute.RegionDiskIamPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -364,25 +364,6 @@ class RegionDiskIamMember(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
-
## This resource supports User Project Overrides.
|
368
|
-
|
369
|
-
-
|
370
|
-
|
371
|
-
# IAM policy for Compute Engine RegionDisk
|
372
|
-
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
373
|
-
|
374
|
-
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
375
|
-
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
376
|
-
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
377
|
-
|
378
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
-
|
380
|
-
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
381
|
-
|
382
|
-
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
383
|
-
|
384
|
-
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
-
|
386
367
|
## compute.RegionDiskIamPolicy
|
387
368
|
|
388
369
|
```python
|
@@ -555,25 +536,6 @@ class RegionDiskIamMember(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Compute Engine RegionDisk
|
563
|
-
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
566
|
-
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
567
|
-
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
572
|
-
|
573
|
-
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## compute.RegionDiskIamPolicy
|
578
540
|
|
579
541
|
```python
|
@@ -261,25 +261,6 @@ class RegionDiskIamPolicy(pulumi.CustomResource):
|
|
261
261
|
member="user:jane@example.com")
|
262
262
|
```
|
263
263
|
|
264
|
-
## This resource supports User Project Overrides.
|
265
|
-
|
266
|
-
-
|
267
|
-
|
268
|
-
# IAM policy for Compute Engine RegionDisk
|
269
|
-
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
270
|
-
|
271
|
-
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
272
|
-
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
273
|
-
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
274
|
-
|
275
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
276
|
-
|
277
|
-
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
278
|
-
|
279
|
-
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
280
|
-
|
281
|
-
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
282
|
-
|
283
264
|
## compute.RegionDiskIamPolicy
|
284
265
|
|
285
266
|
```python
|
@@ -440,25 +421,6 @@ class RegionDiskIamPolicy(pulumi.CustomResource):
|
|
440
421
|
member="user:jane@example.com")
|
441
422
|
```
|
442
423
|
|
443
|
-
## This resource supports User Project Overrides.
|
444
|
-
|
445
|
-
-
|
446
|
-
|
447
|
-
# IAM policy for Compute Engine RegionDisk
|
448
|
-
Three different resources help you manage your IAM policy for Compute Engine RegionDisk. Each of these resources serves a different use case:
|
449
|
-
|
450
|
-
* `compute.RegionDiskIamPolicy`: Authoritative. Sets the IAM policy for the regiondisk and replaces any existing policy already attached.
|
451
|
-
* `compute.RegionDiskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regiondisk are preserved.
|
452
|
-
* `compute.RegionDiskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regiondisk are preserved.
|
453
|
-
|
454
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
-
|
456
|
-
* `compute.RegionDiskIamPolicy`: Retrieves the IAM policy for the regiondisk
|
457
|
-
|
458
|
-
> **Note:** `compute.RegionDiskIamPolicy` **cannot** be used in conjunction with `compute.RegionDiskIamBinding` and `compute.RegionDiskIamMember` or they will fight over what your policy should be.
|
459
|
-
|
460
|
-
> **Note:** `compute.RegionDiskIamBinding` resources **can be** used in conjunction with `compute.RegionDiskIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
-
|
462
424
|
## compute.RegionDiskIamPolicy
|
463
425
|
|
464
426
|
```python
|
@@ -320,25 +320,6 @@ class SnapshotIamBinding(pulumi.CustomResource):
|
|
320
320
|
member="user:jane@example.com")
|
321
321
|
```
|
322
322
|
|
323
|
-
## This resource supports User Project Overrides.
|
324
|
-
|
325
|
-
-
|
326
|
-
|
327
|
-
# IAM policy for Compute Engine Snapshot
|
328
|
-
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
329
|
-
|
330
|
-
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
331
|
-
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
332
|
-
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
333
|
-
|
334
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
335
|
-
|
336
|
-
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
337
|
-
|
338
|
-
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
339
|
-
|
340
|
-
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
341
|
-
|
342
323
|
## compute.SnapshotIamPolicy
|
343
324
|
|
344
325
|
```python
|
@@ -500,25 +481,6 @@ class SnapshotIamBinding(pulumi.CustomResource):
|
|
500
481
|
member="user:jane@example.com")
|
501
482
|
```
|
502
483
|
|
503
|
-
## This resource supports User Project Overrides.
|
504
|
-
|
505
|
-
-
|
506
|
-
|
507
|
-
# IAM policy for Compute Engine Snapshot
|
508
|
-
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
509
|
-
|
510
|
-
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
511
|
-
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
512
|
-
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
513
|
-
|
514
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
515
|
-
|
516
|
-
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
517
|
-
|
518
|
-
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
519
|
-
|
520
|
-
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
521
|
-
|
522
484
|
## compute.SnapshotIamPolicy
|
523
485
|
|
524
486
|
```python
|