pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -280,26 +280,6 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
-
|
285
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
-
---
|
287
|
-
|
288
|
-
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
289
|
-
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
290
|
-
|
291
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
292
|
-
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
293
|
-
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
294
|
-
|
295
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
-
|
297
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
298
|
-
|
299
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
300
|
-
|
301
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
-
|
303
283
|
## accesscontextmanager.AccessPolicyIamPolicy
|
304
284
|
|
305
285
|
```python
|
@@ -451,26 +431,6 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
|
|
451
431
|
member="user:jane@example.com")
|
452
432
|
```
|
453
433
|
|
454
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
455
|
-
|
456
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
457
|
-
---
|
458
|
-
|
459
|
-
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
460
|
-
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
461
|
-
|
462
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
463
|
-
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
464
|
-
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
465
|
-
|
466
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
467
|
-
|
468
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
469
|
-
|
470
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
471
|
-
|
472
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
473
|
-
|
474
434
|
## accesscontextmanager.AccessPolicyIamPolicy
|
475
435
|
|
476
436
|
```python
|
@@ -280,26 +280,6 @@ class AccessPolicyIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
-
|
285
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
-
---
|
287
|
-
|
288
|
-
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
289
|
-
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
290
|
-
|
291
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
292
|
-
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
293
|
-
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
294
|
-
|
295
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
-
|
297
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
298
|
-
|
299
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
300
|
-
|
301
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
-
|
303
283
|
## accesscontextmanager.AccessPolicyIamPolicy
|
304
284
|
|
305
285
|
```python
|
@@ -451,26 +431,6 @@ class AccessPolicyIamMember(pulumi.CustomResource):
|
|
451
431
|
member="user:jane@example.com")
|
452
432
|
```
|
453
433
|
|
454
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
455
|
-
|
456
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
457
|
-
---
|
458
|
-
|
459
|
-
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
460
|
-
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
461
|
-
|
462
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
463
|
-
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
464
|
-
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
465
|
-
|
466
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
467
|
-
|
468
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
469
|
-
|
470
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
471
|
-
|
472
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
473
|
-
|
474
434
|
## accesscontextmanager.AccessPolicyIamPolicy
|
475
435
|
|
476
436
|
```python
|
@@ -177,26 +177,6 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
-
|
182
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
-
---
|
184
|
-
|
185
|
-
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
186
|
-
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
187
|
-
|
188
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
189
|
-
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
190
|
-
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
191
|
-
|
192
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
-
|
194
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
195
|
-
|
196
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
197
|
-
|
198
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
-
|
200
180
|
## accesscontextmanager.AccessPolicyIamPolicy
|
201
181
|
|
202
182
|
```python
|
@@ -336,26 +316,6 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
|
|
336
316
|
member="user:jane@example.com")
|
337
317
|
```
|
338
318
|
|
339
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
340
|
-
|
341
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
342
|
-
---
|
343
|
-
|
344
|
-
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
345
|
-
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
346
|
-
|
347
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
348
|
-
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
349
|
-
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
350
|
-
|
351
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
352
|
-
|
353
|
-
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
354
|
-
|
355
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
356
|
-
|
357
|
-
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
358
|
-
|
359
319
|
## accesscontextmanager.AccessPolicyIamPolicy
|
360
320
|
|
361
321
|
```python
|
@@ -347,25 +347,6 @@ class ApiConfigIamBinding(pulumi.CustomResource):
|
|
347
347
|
member="user:jane@example.com")
|
348
348
|
```
|
349
349
|
|
350
|
-
## This resource supports User Project Overrides.
|
351
|
-
|
352
|
-
-
|
353
|
-
|
354
|
-
# IAM policy for API Gateway ApiConfig
|
355
|
-
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
356
|
-
|
357
|
-
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
358
|
-
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
359
|
-
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
360
|
-
|
361
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
362
|
-
|
363
|
-
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
364
|
-
|
365
|
-
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
366
|
-
|
367
|
-
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
368
|
-
|
369
350
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
370
351
|
|
371
352
|
```python
|
@@ -530,25 +511,6 @@ class ApiConfigIamBinding(pulumi.CustomResource):
|
|
530
511
|
member="user:jane@example.com")
|
531
512
|
```
|
532
513
|
|
533
|
-
## This resource supports User Project Overrides.
|
534
|
-
|
535
|
-
-
|
536
|
-
|
537
|
-
# IAM policy for API Gateway ApiConfig
|
538
|
-
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
539
|
-
|
540
|
-
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
541
|
-
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
542
|
-
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
543
|
-
|
544
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
545
|
-
|
546
|
-
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
547
|
-
|
548
|
-
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
549
|
-
|
550
|
-
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
551
|
-
|
552
514
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
553
515
|
|
554
516
|
```python
|
@@ -347,25 +347,6 @@ class ApiConfigIamMember(pulumi.CustomResource):
|
|
347
347
|
member="user:jane@example.com")
|
348
348
|
```
|
349
349
|
|
350
|
-
## This resource supports User Project Overrides.
|
351
|
-
|
352
|
-
-
|
353
|
-
|
354
|
-
# IAM policy for API Gateway ApiConfig
|
355
|
-
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
356
|
-
|
357
|
-
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
358
|
-
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
359
|
-
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
360
|
-
|
361
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
362
|
-
|
363
|
-
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
364
|
-
|
365
|
-
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
366
|
-
|
367
|
-
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
368
|
-
|
369
350
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
370
351
|
|
371
352
|
```python
|
@@ -530,25 +511,6 @@ class ApiConfigIamMember(pulumi.CustomResource):
|
|
530
511
|
member="user:jane@example.com")
|
531
512
|
```
|
532
513
|
|
533
|
-
## This resource supports User Project Overrides.
|
534
|
-
|
535
|
-
-
|
536
|
-
|
537
|
-
# IAM policy for API Gateway ApiConfig
|
538
|
-
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
539
|
-
|
540
|
-
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
541
|
-
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
542
|
-
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
543
|
-
|
544
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
545
|
-
|
546
|
-
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
547
|
-
|
548
|
-
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
549
|
-
|
550
|
-
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
551
|
-
|
552
514
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
553
515
|
|
554
516
|
```python
|
@@ -244,25 +244,6 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
|
|
244
244
|
member="user:jane@example.com")
|
245
245
|
```
|
246
246
|
|
247
|
-
## This resource supports User Project Overrides.
|
248
|
-
|
249
|
-
-
|
250
|
-
|
251
|
-
# IAM policy for API Gateway ApiConfig
|
252
|
-
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
253
|
-
|
254
|
-
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
255
|
-
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
256
|
-
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
257
|
-
|
258
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
259
|
-
|
260
|
-
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
261
|
-
|
262
|
-
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
263
|
-
|
264
|
-
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
265
|
-
|
266
247
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
267
248
|
|
268
249
|
```python
|
@@ -415,25 +396,6 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
|
|
415
396
|
member="user:jane@example.com")
|
416
397
|
```
|
417
398
|
|
418
|
-
## This resource supports User Project Overrides.
|
419
|
-
|
420
|
-
-
|
421
|
-
|
422
|
-
# IAM policy for API Gateway ApiConfig
|
423
|
-
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
424
|
-
|
425
|
-
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
426
|
-
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
427
|
-
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
428
|
-
|
429
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
430
|
-
|
431
|
-
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
432
|
-
|
433
|
-
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
434
|
-
|
435
|
-
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
436
|
-
|
437
399
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
438
400
|
|
439
401
|
```python
|
@@ -311,25 +311,6 @@ class ApiIamBinding(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
-
## This resource supports User Project Overrides.
|
315
|
-
|
316
|
-
-
|
317
|
-
|
318
|
-
# IAM policy for API Gateway Api
|
319
|
-
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
320
|
-
|
321
|
-
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
322
|
-
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
323
|
-
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
324
|
-
|
325
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
-
|
327
|
-
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
328
|
-
|
329
|
-
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
330
|
-
|
331
|
-
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
-
|
333
314
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
334
315
|
|
335
316
|
```python
|
@@ -490,25 +471,6 @@ class ApiIamBinding(pulumi.CustomResource):
|
|
490
471
|
member="user:jane@example.com")
|
491
472
|
```
|
492
473
|
|
493
|
-
## This resource supports User Project Overrides.
|
494
|
-
|
495
|
-
-
|
496
|
-
|
497
|
-
# IAM policy for API Gateway Api
|
498
|
-
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
499
|
-
|
500
|
-
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
501
|
-
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
502
|
-
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
503
|
-
|
504
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
-
|
506
|
-
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
507
|
-
|
508
|
-
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
509
|
-
|
510
|
-
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
-
|
512
474
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
513
475
|
|
514
476
|
```python
|
@@ -311,25 +311,6 @@ class ApiIamMember(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
-
## This resource supports User Project Overrides.
|
315
|
-
|
316
|
-
-
|
317
|
-
|
318
|
-
# IAM policy for API Gateway Api
|
319
|
-
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
320
|
-
|
321
|
-
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
322
|
-
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
323
|
-
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
324
|
-
|
325
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
-
|
327
|
-
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
328
|
-
|
329
|
-
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
330
|
-
|
331
|
-
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
-
|
333
314
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
334
315
|
|
335
316
|
```python
|
@@ -490,25 +471,6 @@ class ApiIamMember(pulumi.CustomResource):
|
|
490
471
|
member="user:jane@example.com")
|
491
472
|
```
|
492
473
|
|
493
|
-
## This resource supports User Project Overrides.
|
494
|
-
|
495
|
-
-
|
496
|
-
|
497
|
-
# IAM policy for API Gateway Api
|
498
|
-
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
499
|
-
|
500
|
-
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
501
|
-
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
502
|
-
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
503
|
-
|
504
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
-
|
506
|
-
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
507
|
-
|
508
|
-
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
509
|
-
|
510
|
-
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
-
|
512
474
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
513
475
|
|
514
476
|
```python
|
@@ -208,25 +208,6 @@ class ApiIamPolicy(pulumi.CustomResource):
|
|
208
208
|
member="user:jane@example.com")
|
209
209
|
```
|
210
210
|
|
211
|
-
## This resource supports User Project Overrides.
|
212
|
-
|
213
|
-
-
|
214
|
-
|
215
|
-
# IAM policy for API Gateway Api
|
216
|
-
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
217
|
-
|
218
|
-
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
219
|
-
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
220
|
-
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
221
|
-
|
222
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
223
|
-
|
224
|
-
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
225
|
-
|
226
|
-
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
227
|
-
|
228
|
-
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
229
|
-
|
230
211
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
231
212
|
|
232
213
|
```python
|
@@ -375,25 +356,6 @@ class ApiIamPolicy(pulumi.CustomResource):
|
|
375
356
|
member="user:jane@example.com")
|
376
357
|
```
|
377
358
|
|
378
|
-
## This resource supports User Project Overrides.
|
379
|
-
|
380
|
-
-
|
381
|
-
|
382
|
-
# IAM policy for API Gateway Api
|
383
|
-
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
384
|
-
|
385
|
-
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
386
|
-
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
387
|
-
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
388
|
-
|
389
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
390
|
-
|
391
|
-
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
392
|
-
|
393
|
-
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
394
|
-
|
395
|
-
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
396
|
-
|
397
359
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
398
360
|
|
399
361
|
```python
|
@@ -359,25 +359,6 @@ class GatewayIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
-
## This resource supports User Project Overrides.
|
363
|
-
|
364
|
-
-
|
365
|
-
|
366
|
-
# IAM policy for API Gateway Gateway
|
367
|
-
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
368
|
-
|
369
|
-
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
370
|
-
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
371
|
-
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
372
|
-
|
373
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
-
|
375
|
-
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
376
|
-
|
377
|
-
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
378
|
-
|
379
|
-
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
-
|
381
362
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
382
363
|
|
383
364
|
```python
|
@@ -550,25 +531,6 @@ class GatewayIamBinding(pulumi.CustomResource):
|
|
550
531
|
member="user:jane@example.com")
|
551
532
|
```
|
552
533
|
|
553
|
-
## This resource supports User Project Overrides.
|
554
|
-
|
555
|
-
-
|
556
|
-
|
557
|
-
# IAM policy for API Gateway Gateway
|
558
|
-
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
559
|
-
|
560
|
-
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
561
|
-
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
562
|
-
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
563
|
-
|
564
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
-
|
566
|
-
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
567
|
-
|
568
|
-
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
569
|
-
|
570
|
-
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
-
|
572
534
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
573
535
|
|
574
536
|
```python
|
@@ -359,25 +359,6 @@ class GatewayIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
-
## This resource supports User Project Overrides.
|
363
|
-
|
364
|
-
-
|
365
|
-
|
366
|
-
# IAM policy for API Gateway Gateway
|
367
|
-
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
368
|
-
|
369
|
-
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
370
|
-
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
371
|
-
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
372
|
-
|
373
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
-
|
375
|
-
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
376
|
-
|
377
|
-
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
378
|
-
|
379
|
-
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
-
|
381
362
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
382
363
|
|
383
364
|
```python
|
@@ -550,25 +531,6 @@ class GatewayIamMember(pulumi.CustomResource):
|
|
550
531
|
member="user:jane@example.com")
|
551
532
|
```
|
552
533
|
|
553
|
-
## This resource supports User Project Overrides.
|
554
|
-
|
555
|
-
-
|
556
|
-
|
557
|
-
# IAM policy for API Gateway Gateway
|
558
|
-
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
559
|
-
|
560
|
-
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
561
|
-
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
562
|
-
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
563
|
-
|
564
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
-
|
566
|
-
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
567
|
-
|
568
|
-
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
569
|
-
|
570
|
-
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
-
|
572
534
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
573
535
|
|
574
536
|
```python
|
@@ -256,25 +256,6 @@ class GatewayIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
-
## This resource supports User Project Overrides.
|
260
|
-
|
261
|
-
-
|
262
|
-
|
263
|
-
# IAM policy for API Gateway Gateway
|
264
|
-
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
265
|
-
|
266
|
-
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
267
|
-
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
268
|
-
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
269
|
-
|
270
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
-
|
272
|
-
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
273
|
-
|
274
|
-
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
275
|
-
|
276
|
-
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
-
|
278
259
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
279
260
|
|
280
261
|
```python
|
@@ -435,25 +416,6 @@ class GatewayIamPolicy(pulumi.CustomResource):
|
|
435
416
|
member="user:jane@example.com")
|
436
417
|
```
|
437
418
|
|
438
|
-
## This resource supports User Project Overrides.
|
439
|
-
|
440
|
-
-
|
441
|
-
|
442
|
-
# IAM policy for API Gateway Gateway
|
443
|
-
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
444
|
-
|
445
|
-
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
446
|
-
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
447
|
-
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
448
|
-
|
449
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
-
|
451
|
-
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
452
|
-
|
453
|
-
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
454
|
-
|
455
|
-
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
-
|
457
419
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
458
420
|
|
459
421
|
```python
|