pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -288,6 +288,49 @@ class IamAuditConfig(pulumi.CustomResource):
|
|
288
288
|
])
|
289
289
|
```
|
290
290
|
|
291
|
+
## folder.IAMPolicy
|
292
|
+
|
293
|
+
!> **Be careful!** You can accidentally lock yourself out of your folder
|
294
|
+
using this resource. Deleting a `folder.IAMPolicy` removes access
|
295
|
+
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
296
|
+
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
297
|
+
to avoid locking yourself out, and it should generally only be used with folders
|
298
|
+
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
299
|
+
applying the change.
|
300
|
+
|
301
|
+
```python
|
302
|
+
import pulumi
|
303
|
+
import pulumi_gcp as gcp
|
304
|
+
|
305
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
306
|
+
"role": "roles/editor",
|
307
|
+
"members": ["user:jane@example.com"],
|
308
|
+
}])
|
309
|
+
folder = gcp.folder.IAMPolicy("folder",
|
310
|
+
folder="folders/1234567",
|
311
|
+
policy_data=admin.policy_data)
|
312
|
+
```
|
313
|
+
|
314
|
+
With IAM Conditions:
|
315
|
+
|
316
|
+
```python
|
317
|
+
import pulumi
|
318
|
+
import pulumi_gcp as gcp
|
319
|
+
|
320
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
321
|
+
"role": "roles/compute.admin",
|
322
|
+
"members": ["user:jane@example.com"],
|
323
|
+
"condition": {
|
324
|
+
"title": "expires_after_2019_12_31",
|
325
|
+
"description": "Expiring at midnight of 2019-12-31",
|
326
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
327
|
+
},
|
328
|
+
}])
|
329
|
+
folder = gcp.folder.IAMPolicy("folder",
|
330
|
+
folder="folders/1234567",
|
331
|
+
policy_data=admin.policy_data)
|
332
|
+
```
|
333
|
+
|
291
334
|
## folder.IAMBinding
|
292
335
|
|
293
336
|
```python
|
@@ -540,6 +583,49 @@ class IamAuditConfig(pulumi.CustomResource):
|
|
540
583
|
])
|
541
584
|
```
|
542
585
|
|
586
|
+
## folder.IAMPolicy
|
587
|
+
|
588
|
+
!> **Be careful!** You can accidentally lock yourself out of your folder
|
589
|
+
using this resource. Deleting a `folder.IAMPolicy` removes access
|
590
|
+
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
591
|
+
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
592
|
+
to avoid locking yourself out, and it should generally only be used with folders
|
593
|
+
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
594
|
+
applying the change.
|
595
|
+
|
596
|
+
```python
|
597
|
+
import pulumi
|
598
|
+
import pulumi_gcp as gcp
|
599
|
+
|
600
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
601
|
+
"role": "roles/editor",
|
602
|
+
"members": ["user:jane@example.com"],
|
603
|
+
}])
|
604
|
+
folder = gcp.folder.IAMPolicy("folder",
|
605
|
+
folder="folders/1234567",
|
606
|
+
policy_data=admin.policy_data)
|
607
|
+
```
|
608
|
+
|
609
|
+
With IAM Conditions:
|
610
|
+
|
611
|
+
```python
|
612
|
+
import pulumi
|
613
|
+
import pulumi_gcp as gcp
|
614
|
+
|
615
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
616
|
+
"role": "roles/compute.admin",
|
617
|
+
"members": ["user:jane@example.com"],
|
618
|
+
"condition": {
|
619
|
+
"title": "expires_after_2019_12_31",
|
620
|
+
"description": "Expiring at midnight of 2019-12-31",
|
621
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
622
|
+
},
|
623
|
+
}])
|
624
|
+
folder = gcp.folder.IAMPolicy("folder",
|
625
|
+
folder="folders/1234567",
|
626
|
+
policy_data=admin.policy_data)
|
627
|
+
```
|
628
|
+
|
543
629
|
## folder.IAMBinding
|
544
630
|
|
545
631
|
```python
|
pulumi_gcp/folder/iam_member.py
CHANGED
@@ -353,6 +353,49 @@ class IAMMember(pulumi.CustomResource):
|
|
353
353
|
])
|
354
354
|
```
|
355
355
|
|
356
|
+
## folder.IAMPolicy
|
357
|
+
|
358
|
+
!> **Be careful!** You can accidentally lock yourself out of your folder
|
359
|
+
using this resource. Deleting a `folder.IAMPolicy` removes access
|
360
|
+
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
361
|
+
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
362
|
+
to avoid locking yourself out, and it should generally only be used with folders
|
363
|
+
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
364
|
+
applying the change.
|
365
|
+
|
366
|
+
```python
|
367
|
+
import pulumi
|
368
|
+
import pulumi_gcp as gcp
|
369
|
+
|
370
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
371
|
+
"role": "roles/editor",
|
372
|
+
"members": ["user:jane@example.com"],
|
373
|
+
}])
|
374
|
+
folder = gcp.folder.IAMPolicy("folder",
|
375
|
+
folder="folders/1234567",
|
376
|
+
policy_data=admin.policy_data)
|
377
|
+
```
|
378
|
+
|
379
|
+
With IAM Conditions:
|
380
|
+
|
381
|
+
```python
|
382
|
+
import pulumi
|
383
|
+
import pulumi_gcp as gcp
|
384
|
+
|
385
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
386
|
+
"role": "roles/compute.admin",
|
387
|
+
"members": ["user:jane@example.com"],
|
388
|
+
"condition": {
|
389
|
+
"title": "expires_after_2019_12_31",
|
390
|
+
"description": "Expiring at midnight of 2019-12-31",
|
391
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
392
|
+
},
|
393
|
+
}])
|
394
|
+
folder = gcp.folder.IAMPolicy("folder",
|
395
|
+
folder="folders/1234567",
|
396
|
+
policy_data=admin.policy_data)
|
397
|
+
```
|
398
|
+
|
356
399
|
## folder.IAMBinding
|
357
400
|
|
358
401
|
```python
|
@@ -614,6 +657,49 @@ class IAMMember(pulumi.CustomResource):
|
|
614
657
|
])
|
615
658
|
```
|
616
659
|
|
660
|
+
## folder.IAMPolicy
|
661
|
+
|
662
|
+
!> **Be careful!** You can accidentally lock yourself out of your folder
|
663
|
+
using this resource. Deleting a `folder.IAMPolicy` removes access
|
664
|
+
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
665
|
+
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
666
|
+
to avoid locking yourself out, and it should generally only be used with folders
|
667
|
+
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
668
|
+
applying the change.
|
669
|
+
|
670
|
+
```python
|
671
|
+
import pulumi
|
672
|
+
import pulumi_gcp as gcp
|
673
|
+
|
674
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
675
|
+
"role": "roles/editor",
|
676
|
+
"members": ["user:jane@example.com"],
|
677
|
+
}])
|
678
|
+
folder = gcp.folder.IAMPolicy("folder",
|
679
|
+
folder="folders/1234567",
|
680
|
+
policy_data=admin.policy_data)
|
681
|
+
```
|
682
|
+
|
683
|
+
With IAM Conditions:
|
684
|
+
|
685
|
+
```python
|
686
|
+
import pulumi
|
687
|
+
import pulumi_gcp as gcp
|
688
|
+
|
689
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
690
|
+
"role": "roles/compute.admin",
|
691
|
+
"members": ["user:jane@example.com"],
|
692
|
+
"condition": {
|
693
|
+
"title": "expires_after_2019_12_31",
|
694
|
+
"description": "Expiring at midnight of 2019-12-31",
|
695
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
696
|
+
},
|
697
|
+
}])
|
698
|
+
folder = gcp.folder.IAMPolicy("folder",
|
699
|
+
folder="folders/1234567",
|
700
|
+
policy_data=admin.policy_data)
|
701
|
+
```
|
702
|
+
|
617
703
|
## folder.IAMBinding
|
618
704
|
|
619
705
|
```python
|
pulumi_gcp/folder/iam_policy.py
CHANGED
@@ -282,6 +282,49 @@ class IAMPolicy(pulumi.CustomResource):
|
|
282
282
|
])
|
283
283
|
```
|
284
284
|
|
285
|
+
## folder.IAMPolicy
|
286
|
+
|
287
|
+
!> **Be careful!** You can accidentally lock yourself out of your folder
|
288
|
+
using this resource. Deleting a `folder.IAMPolicy` removes access
|
289
|
+
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
290
|
+
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
291
|
+
to avoid locking yourself out, and it should generally only be used with folders
|
292
|
+
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
293
|
+
applying the change.
|
294
|
+
|
295
|
+
```python
|
296
|
+
import pulumi
|
297
|
+
import pulumi_gcp as gcp
|
298
|
+
|
299
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
300
|
+
"role": "roles/editor",
|
301
|
+
"members": ["user:jane@example.com"],
|
302
|
+
}])
|
303
|
+
folder = gcp.folder.IAMPolicy("folder",
|
304
|
+
folder="folders/1234567",
|
305
|
+
policy_data=admin.policy_data)
|
306
|
+
```
|
307
|
+
|
308
|
+
With IAM Conditions:
|
309
|
+
|
310
|
+
```python
|
311
|
+
import pulumi
|
312
|
+
import pulumi_gcp as gcp
|
313
|
+
|
314
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
315
|
+
"role": "roles/compute.admin",
|
316
|
+
"members": ["user:jane@example.com"],
|
317
|
+
"condition": {
|
318
|
+
"title": "expires_after_2019_12_31",
|
319
|
+
"description": "Expiring at midnight of 2019-12-31",
|
320
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
321
|
+
},
|
322
|
+
}])
|
323
|
+
folder = gcp.folder.IAMPolicy("folder",
|
324
|
+
folder="folders/1234567",
|
325
|
+
policy_data=admin.policy_data)
|
326
|
+
```
|
327
|
+
|
285
328
|
## folder.IAMBinding
|
286
329
|
|
287
330
|
```python
|
@@ -540,6 +583,49 @@ class IAMPolicy(pulumi.CustomResource):
|
|
540
583
|
])
|
541
584
|
```
|
542
585
|
|
586
|
+
## folder.IAMPolicy
|
587
|
+
|
588
|
+
!> **Be careful!** You can accidentally lock yourself out of your folder
|
589
|
+
using this resource. Deleting a `folder.IAMPolicy` removes access
|
590
|
+
from anyone without permissions on its parent folder/organization. Proceed with caution.
|
591
|
+
It's not recommended to use `folder.IAMPolicy` with your provider folder
|
592
|
+
to avoid locking yourself out, and it should generally only be used with folders
|
593
|
+
fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
|
594
|
+
applying the change.
|
595
|
+
|
596
|
+
```python
|
597
|
+
import pulumi
|
598
|
+
import pulumi_gcp as gcp
|
599
|
+
|
600
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
601
|
+
"role": "roles/editor",
|
602
|
+
"members": ["user:jane@example.com"],
|
603
|
+
}])
|
604
|
+
folder = gcp.folder.IAMPolicy("folder",
|
605
|
+
folder="folders/1234567",
|
606
|
+
policy_data=admin.policy_data)
|
607
|
+
```
|
608
|
+
|
609
|
+
With IAM Conditions:
|
610
|
+
|
611
|
+
```python
|
612
|
+
import pulumi
|
613
|
+
import pulumi_gcp as gcp
|
614
|
+
|
615
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
616
|
+
"role": "roles/compute.admin",
|
617
|
+
"members": ["user:jane@example.com"],
|
618
|
+
"condition": {
|
619
|
+
"title": "expires_after_2019_12_31",
|
620
|
+
"description": "Expiring at midnight of 2019-12-31",
|
621
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
622
|
+
},
|
623
|
+
}])
|
624
|
+
folder = gcp.folder.IAMPolicy("folder",
|
625
|
+
folder="folders/1234567",
|
626
|
+
policy_data=admin.policy_data)
|
627
|
+
```
|
628
|
+
|
543
629
|
## folder.IAMBinding
|
544
630
|
|
545
631
|
```python
|
@@ -368,25 +368,6 @@ class BackupPlanIamBinding(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
-
## This resource supports User Project Overrides.
|
372
|
-
|
373
|
-
-
|
374
|
-
|
375
|
-
# IAM policy for Backup for GKE BackupPlan
|
376
|
-
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
377
|
-
|
378
|
-
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
379
|
-
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
380
|
-
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
381
|
-
|
382
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
-
|
384
|
-
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
385
|
-
|
386
|
-
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
387
|
-
|
388
|
-
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
-
|
390
371
|
## gkebackup.BackupPlanIamPolicy
|
391
372
|
|
392
373
|
```python
|
@@ -560,25 +541,6 @@ class BackupPlanIamBinding(pulumi.CustomResource):
|
|
560
541
|
member="user:jane@example.com")
|
561
542
|
```
|
562
543
|
|
563
|
-
## This resource supports User Project Overrides.
|
564
|
-
|
565
|
-
-
|
566
|
-
|
567
|
-
# IAM policy for Backup for GKE BackupPlan
|
568
|
-
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
569
|
-
|
570
|
-
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
571
|
-
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
572
|
-
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
573
|
-
|
574
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
-
|
576
|
-
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
577
|
-
|
578
|
-
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
579
|
-
|
580
|
-
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
-
|
582
544
|
## gkebackup.BackupPlanIamPolicy
|
583
545
|
|
584
546
|
```python
|
@@ -368,25 +368,6 @@ class BackupPlanIamMember(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
-
## This resource supports User Project Overrides.
|
372
|
-
|
373
|
-
-
|
374
|
-
|
375
|
-
# IAM policy for Backup for GKE BackupPlan
|
376
|
-
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
377
|
-
|
378
|
-
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
379
|
-
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
380
|
-
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
381
|
-
|
382
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
-
|
384
|
-
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
385
|
-
|
386
|
-
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
387
|
-
|
388
|
-
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
-
|
390
371
|
## gkebackup.BackupPlanIamPolicy
|
391
372
|
|
392
373
|
```python
|
@@ -560,25 +541,6 @@ class BackupPlanIamMember(pulumi.CustomResource):
|
|
560
541
|
member="user:jane@example.com")
|
561
542
|
```
|
562
543
|
|
563
|
-
## This resource supports User Project Overrides.
|
564
|
-
|
565
|
-
-
|
566
|
-
|
567
|
-
# IAM policy for Backup for GKE BackupPlan
|
568
|
-
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
569
|
-
|
570
|
-
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
571
|
-
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
572
|
-
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
573
|
-
|
574
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
-
|
576
|
-
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
577
|
-
|
578
|
-
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
579
|
-
|
580
|
-
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
-
|
582
544
|
## gkebackup.BackupPlanIamPolicy
|
583
545
|
|
584
546
|
```python
|
@@ -265,25 +265,6 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
|
|
265
265
|
member="user:jane@example.com")
|
266
266
|
```
|
267
267
|
|
268
|
-
## This resource supports User Project Overrides.
|
269
|
-
|
270
|
-
-
|
271
|
-
|
272
|
-
# IAM policy for Backup for GKE BackupPlan
|
273
|
-
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
274
|
-
|
275
|
-
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
276
|
-
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
277
|
-
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
278
|
-
|
279
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
280
|
-
|
281
|
-
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
282
|
-
|
283
|
-
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
284
|
-
|
285
|
-
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
286
|
-
|
287
268
|
## gkebackup.BackupPlanIamPolicy
|
288
269
|
|
289
270
|
```python
|
@@ -445,25 +426,6 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
|
|
445
426
|
member="user:jane@example.com")
|
446
427
|
```
|
447
428
|
|
448
|
-
## This resource supports User Project Overrides.
|
449
|
-
|
450
|
-
-
|
451
|
-
|
452
|
-
# IAM policy for Backup for GKE BackupPlan
|
453
|
-
Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
|
454
|
-
|
455
|
-
* `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
|
456
|
-
* `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
|
457
|
-
* `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
|
458
|
-
|
459
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
460
|
-
|
461
|
-
* `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
|
462
|
-
|
463
|
-
> **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
|
464
|
-
|
465
|
-
> **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
|
466
|
-
|
467
429
|
## gkebackup.BackupPlanIamPolicy
|
468
430
|
|
469
431
|
```python
|
@@ -368,25 +368,6 @@ class RestorePlanIamBinding(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
-
## This resource supports User Project Overrides.
|
372
|
-
|
373
|
-
-
|
374
|
-
|
375
|
-
# IAM policy for Backup for GKE RestorePlan
|
376
|
-
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
377
|
-
|
378
|
-
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
379
|
-
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
380
|
-
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
381
|
-
|
382
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
-
|
384
|
-
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
385
|
-
|
386
|
-
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
387
|
-
|
388
|
-
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
-
|
390
371
|
## gkebackup.RestorePlanIamPolicy
|
391
372
|
|
392
373
|
```python
|
@@ -560,25 +541,6 @@ class RestorePlanIamBinding(pulumi.CustomResource):
|
|
560
541
|
member="user:jane@example.com")
|
561
542
|
```
|
562
543
|
|
563
|
-
## This resource supports User Project Overrides.
|
564
|
-
|
565
|
-
-
|
566
|
-
|
567
|
-
# IAM policy for Backup for GKE RestorePlan
|
568
|
-
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
569
|
-
|
570
|
-
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
571
|
-
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
572
|
-
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
573
|
-
|
574
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
-
|
576
|
-
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
577
|
-
|
578
|
-
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
579
|
-
|
580
|
-
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
-
|
582
544
|
## gkebackup.RestorePlanIamPolicy
|
583
545
|
|
584
546
|
```python
|
@@ -368,25 +368,6 @@ class RestorePlanIamMember(pulumi.CustomResource):
|
|
368
368
|
member="user:jane@example.com")
|
369
369
|
```
|
370
370
|
|
371
|
-
## This resource supports User Project Overrides.
|
372
|
-
|
373
|
-
-
|
374
|
-
|
375
|
-
# IAM policy for Backup for GKE RestorePlan
|
376
|
-
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
377
|
-
|
378
|
-
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
379
|
-
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
380
|
-
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
381
|
-
|
382
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
383
|
-
|
384
|
-
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
385
|
-
|
386
|
-
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
387
|
-
|
388
|
-
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
389
|
-
|
390
371
|
## gkebackup.RestorePlanIamPolicy
|
391
372
|
|
392
373
|
```python
|
@@ -560,25 +541,6 @@ class RestorePlanIamMember(pulumi.CustomResource):
|
|
560
541
|
member="user:jane@example.com")
|
561
542
|
```
|
562
543
|
|
563
|
-
## This resource supports User Project Overrides.
|
564
|
-
|
565
|
-
-
|
566
|
-
|
567
|
-
# IAM policy for Backup for GKE RestorePlan
|
568
|
-
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
569
|
-
|
570
|
-
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
571
|
-
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
572
|
-
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
573
|
-
|
574
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
575
|
-
|
576
|
-
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
577
|
-
|
578
|
-
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
579
|
-
|
580
|
-
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
581
|
-
|
582
544
|
## gkebackup.RestorePlanIamPolicy
|
583
545
|
|
584
546
|
```python
|
@@ -265,25 +265,6 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
|
|
265
265
|
member="user:jane@example.com")
|
266
266
|
```
|
267
267
|
|
268
|
-
## This resource supports User Project Overrides.
|
269
|
-
|
270
|
-
-
|
271
|
-
|
272
|
-
# IAM policy for Backup for GKE RestorePlan
|
273
|
-
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
274
|
-
|
275
|
-
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
276
|
-
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
277
|
-
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
278
|
-
|
279
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
280
|
-
|
281
|
-
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
282
|
-
|
283
|
-
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
284
|
-
|
285
|
-
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
286
|
-
|
287
268
|
## gkebackup.RestorePlanIamPolicy
|
288
269
|
|
289
270
|
```python
|
@@ -445,25 +426,6 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
|
|
445
426
|
member="user:jane@example.com")
|
446
427
|
```
|
447
428
|
|
448
|
-
## This resource supports User Project Overrides.
|
449
|
-
|
450
|
-
-
|
451
|
-
|
452
|
-
# IAM policy for Backup for GKE RestorePlan
|
453
|
-
Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
|
454
|
-
|
455
|
-
* `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
|
456
|
-
* `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
|
457
|
-
* `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
|
458
|
-
|
459
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
460
|
-
|
461
|
-
* `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
|
462
|
-
|
463
|
-
> **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
|
464
|
-
|
465
|
-
> **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
|
466
|
-
|
467
429
|
## gkebackup.RestorePlanIamPolicy
|
468
430
|
|
469
431
|
```python
|
@@ -364,25 +364,6 @@ class FeatureIamBinding(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
-
## This resource supports User Project Overrides.
|
368
|
-
|
369
|
-
-
|
370
|
-
|
371
|
-
# IAM policy for GKEHub Feature
|
372
|
-
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
373
|
-
|
374
|
-
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
375
|
-
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
376
|
-
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
377
|
-
|
378
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
-
|
380
|
-
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
381
|
-
|
382
|
-
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
383
|
-
|
384
|
-
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
-
|
386
367
|
## gkehub.FeatureIamPolicy
|
387
368
|
|
388
369
|
```python
|
@@ -555,25 +536,6 @@ class FeatureIamBinding(pulumi.CustomResource):
|
|
555
536
|
member="user:jane@example.com")
|
556
537
|
```
|
557
538
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for GKEHub Feature
|
563
|
-
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
566
|
-
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
567
|
-
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
572
|
-
|
573
|
-
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
539
|
## gkehub.FeatureIamPolicy
|
578
540
|
|
579
541
|
```python
|