pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -320,25 +320,6 @@ class SnapshotIamMember(pulumi.CustomResource):
|
|
320
320
|
member="user:jane@example.com")
|
321
321
|
```
|
322
322
|
|
323
|
-
## This resource supports User Project Overrides.
|
324
|
-
|
325
|
-
-
|
326
|
-
|
327
|
-
# IAM policy for Compute Engine Snapshot
|
328
|
-
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
329
|
-
|
330
|
-
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
331
|
-
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
332
|
-
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
333
|
-
|
334
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
335
|
-
|
336
|
-
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
337
|
-
|
338
|
-
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
339
|
-
|
340
|
-
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
341
|
-
|
342
323
|
## compute.SnapshotIamPolicy
|
343
324
|
|
344
325
|
```python
|
@@ -500,25 +481,6 @@ class SnapshotIamMember(pulumi.CustomResource):
|
|
500
481
|
member="user:jane@example.com")
|
501
482
|
```
|
502
483
|
|
503
|
-
## This resource supports User Project Overrides.
|
504
|
-
|
505
|
-
-
|
506
|
-
|
507
|
-
# IAM policy for Compute Engine Snapshot
|
508
|
-
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
509
|
-
|
510
|
-
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
511
|
-
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
512
|
-
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
513
|
-
|
514
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
515
|
-
|
516
|
-
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
517
|
-
|
518
|
-
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
519
|
-
|
520
|
-
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
521
|
-
|
522
484
|
## compute.SnapshotIamPolicy
|
523
485
|
|
524
486
|
```python
|
@@ -217,25 +217,6 @@ class SnapshotIamPolicy(pulumi.CustomResource):
|
|
217
217
|
member="user:jane@example.com")
|
218
218
|
```
|
219
219
|
|
220
|
-
## This resource supports User Project Overrides.
|
221
|
-
|
222
|
-
-
|
223
|
-
|
224
|
-
# IAM policy for Compute Engine Snapshot
|
225
|
-
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
226
|
-
|
227
|
-
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
228
|
-
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
229
|
-
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
230
|
-
|
231
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
232
|
-
|
233
|
-
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
234
|
-
|
235
|
-
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
236
|
-
|
237
|
-
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
238
|
-
|
239
220
|
## compute.SnapshotIamPolicy
|
240
221
|
|
241
222
|
```python
|
@@ -385,25 +366,6 @@ class SnapshotIamPolicy(pulumi.CustomResource):
|
|
385
366
|
member="user:jane@example.com")
|
386
367
|
```
|
387
368
|
|
388
|
-
## This resource supports User Project Overrides.
|
389
|
-
|
390
|
-
-
|
391
|
-
|
392
|
-
# IAM policy for Compute Engine Snapshot
|
393
|
-
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
394
|
-
|
395
|
-
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
396
|
-
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
397
|
-
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
398
|
-
|
399
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
400
|
-
|
401
|
-
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
402
|
-
|
403
|
-
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
404
|
-
|
405
|
-
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
406
|
-
|
407
369
|
## compute.SnapshotIamPolicy
|
408
370
|
|
409
371
|
```python
|
@@ -439,27 +439,6 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
|
|
439
439
|
})
|
440
440
|
```
|
441
441
|
|
442
|
-
## This resource supports User Project Overrides.
|
443
|
-
|
444
|
-
-
|
445
|
-
|
446
|
-
# IAM policy for Compute Engine Subnetwork
|
447
|
-
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
448
|
-
|
449
|
-
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
450
|
-
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
451
|
-
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
452
|
-
|
453
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
-
|
455
|
-
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
456
|
-
|
457
|
-
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
458
|
-
|
459
|
-
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
460
|
-
|
461
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
462
|
-
|
463
442
|
## compute.SubnetworkIAMPolicy
|
464
443
|
|
465
444
|
```python
|
@@ -753,27 +732,6 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
|
|
753
732
|
})
|
754
733
|
```
|
755
734
|
|
756
|
-
## This resource supports User Project Overrides.
|
757
|
-
|
758
|
-
-
|
759
|
-
|
760
|
-
# IAM policy for Compute Engine Subnetwork
|
761
|
-
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
762
|
-
|
763
|
-
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
764
|
-
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
765
|
-
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
766
|
-
|
767
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
768
|
-
|
769
|
-
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
770
|
-
|
771
|
-
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
772
|
-
|
773
|
-
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
774
|
-
|
775
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
776
|
-
|
777
735
|
## compute.SubnetworkIAMPolicy
|
778
736
|
|
779
737
|
```python
|
@@ -439,27 +439,6 @@ class SubnetworkIAMMember(pulumi.CustomResource):
|
|
439
439
|
})
|
440
440
|
```
|
441
441
|
|
442
|
-
## This resource supports User Project Overrides.
|
443
|
-
|
444
|
-
-
|
445
|
-
|
446
|
-
# IAM policy for Compute Engine Subnetwork
|
447
|
-
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
448
|
-
|
449
|
-
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
450
|
-
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
451
|
-
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
452
|
-
|
453
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
-
|
455
|
-
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
456
|
-
|
457
|
-
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
458
|
-
|
459
|
-
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
460
|
-
|
461
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
462
|
-
|
463
442
|
## compute.SubnetworkIAMPolicy
|
464
443
|
|
465
444
|
```python
|
@@ -753,27 +732,6 @@ class SubnetworkIAMMember(pulumi.CustomResource):
|
|
753
732
|
})
|
754
733
|
```
|
755
734
|
|
756
|
-
## This resource supports User Project Overrides.
|
757
|
-
|
758
|
-
-
|
759
|
-
|
760
|
-
# IAM policy for Compute Engine Subnetwork
|
761
|
-
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
762
|
-
|
763
|
-
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
764
|
-
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
765
|
-
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
766
|
-
|
767
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
768
|
-
|
769
|
-
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
770
|
-
|
771
|
-
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
772
|
-
|
773
|
-
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
774
|
-
|
775
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
776
|
-
|
777
735
|
## compute.SubnetworkIAMPolicy
|
778
736
|
|
779
737
|
```python
|
@@ -324,27 +324,6 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
|
|
324
324
|
})
|
325
325
|
```
|
326
326
|
|
327
|
-
## This resource supports User Project Overrides.
|
328
|
-
|
329
|
-
-
|
330
|
-
|
331
|
-
# IAM policy for Compute Engine Subnetwork
|
332
|
-
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
333
|
-
|
334
|
-
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
335
|
-
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
336
|
-
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
337
|
-
|
338
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
339
|
-
|
340
|
-
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
341
|
-
|
342
|
-
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
343
|
-
|
344
|
-
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
345
|
-
|
346
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
347
|
-
|
348
327
|
## compute.SubnetworkIAMPolicy
|
349
328
|
|
350
329
|
```python
|
@@ -624,27 +603,6 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
|
|
624
603
|
})
|
625
604
|
```
|
626
605
|
|
627
|
-
## This resource supports User Project Overrides.
|
628
|
-
|
629
|
-
-
|
630
|
-
|
631
|
-
# IAM policy for Compute Engine Subnetwork
|
632
|
-
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
633
|
-
|
634
|
-
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
635
|
-
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
636
|
-
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
637
|
-
|
638
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
639
|
-
|
640
|
-
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
641
|
-
|
642
|
-
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
643
|
-
|
644
|
-
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
645
|
-
|
646
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
647
|
-
|
648
606
|
## compute.SubnetworkIAMPolicy
|
649
607
|
|
650
608
|
```python
|
@@ -319,25 +319,6 @@ class NoteIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Container Registry Note
|
327
|
-
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
330
|
-
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
331
|
-
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
336
|
-
|
337
|
-
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## containeranalysis.NoteIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class NoteIamBinding(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Container Registry Note
|
507
|
-
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
510
|
-
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
511
|
-
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
516
|
-
|
517
|
-
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## containeranalysis.NoteIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -319,25 +319,6 @@ class NoteIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Container Registry Note
|
327
|
-
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
330
|
-
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
331
|
-
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
336
|
-
|
337
|
-
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## containeranalysis.NoteIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class NoteIamMember(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Container Registry Note
|
507
|
-
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
510
|
-
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
511
|
-
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
516
|
-
|
517
|
-
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## containeranalysis.NoteIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -216,25 +216,6 @@ class NoteIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
-
## This resource supports User Project Overrides.
|
220
|
-
|
221
|
-
-
|
222
|
-
|
223
|
-
# IAM policy for Container Registry Note
|
224
|
-
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
225
|
-
|
226
|
-
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
227
|
-
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
228
|
-
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
229
|
-
|
230
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
-
|
232
|
-
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
233
|
-
|
234
|
-
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
235
|
-
|
236
|
-
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
-
|
238
219
|
## containeranalysis.NoteIamPolicy
|
239
220
|
|
240
221
|
```python
|
@@ -384,25 +365,6 @@ class NoteIamPolicy(pulumi.CustomResource):
|
|
384
365
|
member="user:jane@example.com")
|
385
366
|
```
|
386
367
|
|
387
|
-
## This resource supports User Project Overrides.
|
388
|
-
|
389
|
-
-
|
390
|
-
|
391
|
-
# IAM policy for Container Registry Note
|
392
|
-
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
393
|
-
|
394
|
-
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
395
|
-
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
396
|
-
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
397
|
-
|
398
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
-
|
400
|
-
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
401
|
-
|
402
|
-
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
403
|
-
|
404
|
-
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
-
|
406
368
|
## containeranalysis.NoteIamPolicy
|
407
369
|
|
408
370
|
```python
|
@@ -341,25 +341,6 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
-
## This resource supports User Project Overrides.
|
345
|
-
|
346
|
-
-
|
347
|
-
|
348
|
-
# IAM policy for Data catalog EntryGroup
|
349
|
-
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
350
|
-
|
351
|
-
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
352
|
-
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
353
|
-
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
354
|
-
|
355
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
-
|
357
|
-
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
358
|
-
|
359
|
-
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
360
|
-
|
361
|
-
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
-
|
363
344
|
## datacatalog.EntryGroupIamPolicy
|
364
345
|
|
365
346
|
```python
|
@@ -517,25 +498,6 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
517
498
|
member="user:jane@example.com")
|
518
499
|
```
|
519
500
|
|
520
|
-
## This resource supports User Project Overrides.
|
521
|
-
|
522
|
-
-
|
523
|
-
|
524
|
-
# IAM policy for Data catalog EntryGroup
|
525
|
-
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
526
|
-
|
527
|
-
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
528
|
-
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
529
|
-
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
530
|
-
|
531
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
-
|
533
|
-
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
534
|
-
|
535
|
-
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
536
|
-
|
537
|
-
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
-
|
539
501
|
## datacatalog.EntryGroupIamPolicy
|
540
502
|
|
541
503
|
```python
|
@@ -341,25 +341,6 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
-
## This resource supports User Project Overrides.
|
345
|
-
|
346
|
-
-
|
347
|
-
|
348
|
-
# IAM policy for Data catalog EntryGroup
|
349
|
-
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
350
|
-
|
351
|
-
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
352
|
-
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
353
|
-
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
354
|
-
|
355
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
-
|
357
|
-
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
358
|
-
|
359
|
-
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
360
|
-
|
361
|
-
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
-
|
363
344
|
## datacatalog.EntryGroupIamPolicy
|
364
345
|
|
365
346
|
```python
|
@@ -517,25 +498,6 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
517
498
|
member="user:jane@example.com")
|
518
499
|
```
|
519
500
|
|
520
|
-
## This resource supports User Project Overrides.
|
521
|
-
|
522
|
-
-
|
523
|
-
|
524
|
-
# IAM policy for Data catalog EntryGroup
|
525
|
-
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
526
|
-
|
527
|
-
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
528
|
-
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
529
|
-
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
530
|
-
|
531
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
-
|
533
|
-
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
534
|
-
|
535
|
-
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
536
|
-
|
537
|
-
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
-
|
539
501
|
## datacatalog.EntryGroupIamPolicy
|
540
502
|
|
541
503
|
```python
|
@@ -238,25 +238,6 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
238
238
|
member="user:jane@example.com")
|
239
239
|
```
|
240
240
|
|
241
|
-
## This resource supports User Project Overrides.
|
242
|
-
|
243
|
-
-
|
244
|
-
|
245
|
-
# IAM policy for Data catalog EntryGroup
|
246
|
-
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
247
|
-
|
248
|
-
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
249
|
-
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
250
|
-
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
251
|
-
|
252
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
253
|
-
|
254
|
-
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
255
|
-
|
256
|
-
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
257
|
-
|
258
|
-
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
259
|
-
|
260
241
|
## datacatalog.EntryGroupIamPolicy
|
261
242
|
|
262
243
|
```python
|
@@ -402,25 +383,6 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
402
383
|
member="user:jane@example.com")
|
403
384
|
```
|
404
385
|
|
405
|
-
## This resource supports User Project Overrides.
|
406
|
-
|
407
|
-
-
|
408
|
-
|
409
|
-
# IAM policy for Data catalog EntryGroup
|
410
|
-
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
411
|
-
|
412
|
-
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
413
|
-
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
414
|
-
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
415
|
-
|
416
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
-
|
418
|
-
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
419
|
-
|
420
|
-
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
421
|
-
|
422
|
-
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
-
|
424
386
|
## datacatalog.EntryGroupIamPolicy
|
425
387
|
|
426
388
|
```python
|
@@ -279,26 +279,6 @@ class PolicyTagIamBinding(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
-
|
284
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
-
---
|
286
|
-
|
287
|
-
# IAM policy for Data catalog PolicyTag
|
288
|
-
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
289
|
-
|
290
|
-
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
291
|
-
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
292
|
-
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
293
|
-
|
294
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
-
|
296
|
-
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
297
|
-
|
298
|
-
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
299
|
-
|
300
|
-
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
-
|
302
282
|
## datacatalog.PolicyTagIamPolicy
|
303
283
|
|
304
284
|
```python
|
@@ -448,26 +428,6 @@ class PolicyTagIamBinding(pulumi.CustomResource):
|
|
448
428
|
member="user:jane@example.com")
|
449
429
|
```
|
450
430
|
|
451
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
452
|
-
|
453
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
454
|
-
---
|
455
|
-
|
456
|
-
# IAM policy for Data catalog PolicyTag
|
457
|
-
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
458
|
-
|
459
|
-
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
460
|
-
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
461
|
-
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
462
|
-
|
463
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
-
|
465
|
-
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
466
|
-
|
467
|
-
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
468
|
-
|
469
|
-
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
-
|
471
431
|
## datacatalog.PolicyTagIamPolicy
|
472
432
|
|
473
433
|
```python
|