pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -464,27 +464,6 @@ class AppEngineVersionIamBinding(pulumi.CustomResource):
|
|
464
464
|
})
|
465
465
|
```
|
466
466
|
|
467
|
-
## This resource supports User Project Overrides.
|
468
|
-
|
469
|
-
-
|
470
|
-
|
471
|
-
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
472
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
473
|
-
|
474
|
-
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
475
|
-
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
476
|
-
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
477
|
-
|
478
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
479
|
-
|
480
|
-
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
481
|
-
|
482
|
-
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
483
|
-
|
484
|
-
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
485
|
-
|
486
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
487
|
-
|
488
467
|
## iap.AppEngineVersionIamPolicy
|
489
468
|
|
490
469
|
```python
|
@@ -788,27 +767,6 @@ class AppEngineVersionIamBinding(pulumi.CustomResource):
|
|
788
767
|
})
|
789
768
|
```
|
790
769
|
|
791
|
-
## This resource supports User Project Overrides.
|
792
|
-
|
793
|
-
-
|
794
|
-
|
795
|
-
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
796
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
797
|
-
|
798
|
-
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
799
|
-
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
800
|
-
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
801
|
-
|
802
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
803
|
-
|
804
|
-
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
805
|
-
|
806
|
-
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
807
|
-
|
808
|
-
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
809
|
-
|
810
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
811
|
-
|
812
770
|
## iap.AppEngineVersionIamPolicy
|
813
771
|
|
814
772
|
```python
|
@@ -464,27 +464,6 @@ class AppEngineVersionIamMember(pulumi.CustomResource):
|
|
464
464
|
})
|
465
465
|
```
|
466
466
|
|
467
|
-
## This resource supports User Project Overrides.
|
468
|
-
|
469
|
-
-
|
470
|
-
|
471
|
-
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
472
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
473
|
-
|
474
|
-
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
475
|
-
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
476
|
-
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
477
|
-
|
478
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
479
|
-
|
480
|
-
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
481
|
-
|
482
|
-
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
483
|
-
|
484
|
-
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
485
|
-
|
486
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
487
|
-
|
488
467
|
## iap.AppEngineVersionIamPolicy
|
489
468
|
|
490
469
|
```python
|
@@ -788,27 +767,6 @@ class AppEngineVersionIamMember(pulumi.CustomResource):
|
|
788
767
|
})
|
789
768
|
```
|
790
769
|
|
791
|
-
## This resource supports User Project Overrides.
|
792
|
-
|
793
|
-
-
|
794
|
-
|
795
|
-
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
796
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
797
|
-
|
798
|
-
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
799
|
-
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
800
|
-
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
801
|
-
|
802
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
803
|
-
|
804
|
-
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
805
|
-
|
806
|
-
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
807
|
-
|
808
|
-
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
809
|
-
|
810
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
811
|
-
|
812
770
|
## iap.AppEngineVersionIamPolicy
|
813
771
|
|
814
772
|
```python
|
@@ -349,27 +349,6 @@ class AppEngineVersionIamPolicy(pulumi.CustomResource):
|
|
349
349
|
})
|
350
350
|
```
|
351
351
|
|
352
|
-
## This resource supports User Project Overrides.
|
353
|
-
|
354
|
-
-
|
355
|
-
|
356
|
-
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
357
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
358
|
-
|
359
|
-
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
360
|
-
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
361
|
-
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
362
|
-
|
363
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
364
|
-
|
365
|
-
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
366
|
-
|
367
|
-
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
368
|
-
|
369
|
-
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
370
|
-
|
371
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
372
|
-
|
373
352
|
## iap.AppEngineVersionIamPolicy
|
374
353
|
|
375
354
|
```python
|
@@ -659,27 +638,6 @@ class AppEngineVersionIamPolicy(pulumi.CustomResource):
|
|
659
638
|
})
|
660
639
|
```
|
661
640
|
|
662
|
-
## This resource supports User Project Overrides.
|
663
|
-
|
664
|
-
-
|
665
|
-
|
666
|
-
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
667
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
668
|
-
|
669
|
-
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
670
|
-
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
671
|
-
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
672
|
-
|
673
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
674
|
-
|
675
|
-
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
676
|
-
|
677
|
-
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
678
|
-
|
679
|
-
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
680
|
-
|
681
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
682
|
-
|
683
641
|
## iap.AppEngineVersionIamPolicy
|
684
642
|
|
685
643
|
```python
|
@@ -431,27 +431,6 @@ class TunnelDestGroupIamBinding(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
-
## This resource supports User Project Overrides.
|
435
|
-
|
436
|
-
-
|
437
|
-
|
438
|
-
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
439
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
440
|
-
|
441
|
-
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
442
|
-
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
443
|
-
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
444
|
-
|
445
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
-
|
447
|
-
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
448
|
-
|
449
|
-
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
450
|
-
|
451
|
-
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
-
|
453
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
-
|
455
434
|
## iap.TunnelDestGroupIamPolicy
|
456
435
|
|
457
436
|
```python
|
@@ -746,27 +725,6 @@ class TunnelDestGroupIamBinding(pulumi.CustomResource):
|
|
746
725
|
})
|
747
726
|
```
|
748
727
|
|
749
|
-
## This resource supports User Project Overrides.
|
750
|
-
|
751
|
-
-
|
752
|
-
|
753
|
-
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
754
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
755
|
-
|
756
|
-
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
757
|
-
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
758
|
-
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
759
|
-
|
760
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
761
|
-
|
762
|
-
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
763
|
-
|
764
|
-
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
765
|
-
|
766
|
-
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
767
|
-
|
768
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
769
|
-
|
770
728
|
## iap.TunnelDestGroupIamPolicy
|
771
729
|
|
772
730
|
```python
|
@@ -431,27 +431,6 @@ class TunnelDestGroupIamMember(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
-
## This resource supports User Project Overrides.
|
435
|
-
|
436
|
-
-
|
437
|
-
|
438
|
-
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
439
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
440
|
-
|
441
|
-
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
442
|
-
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
443
|
-
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
444
|
-
|
445
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
-
|
447
|
-
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
448
|
-
|
449
|
-
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
450
|
-
|
451
|
-
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
-
|
453
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
-
|
455
434
|
## iap.TunnelDestGroupIamPolicy
|
456
435
|
|
457
436
|
```python
|
@@ -746,27 +725,6 @@ class TunnelDestGroupIamMember(pulumi.CustomResource):
|
|
746
725
|
})
|
747
726
|
```
|
748
727
|
|
749
|
-
## This resource supports User Project Overrides.
|
750
|
-
|
751
|
-
-
|
752
|
-
|
753
|
-
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
754
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
755
|
-
|
756
|
-
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
757
|
-
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
758
|
-
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
759
|
-
|
760
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
761
|
-
|
762
|
-
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
763
|
-
|
764
|
-
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
765
|
-
|
766
|
-
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
767
|
-
|
768
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
769
|
-
|
770
728
|
## iap.TunnelDestGroupIamPolicy
|
771
729
|
|
772
730
|
```python
|
@@ -316,27 +316,6 @@ class TunnelDestGroupIamPolicy(pulumi.CustomResource):
|
|
316
316
|
})
|
317
317
|
```
|
318
318
|
|
319
|
-
## This resource supports User Project Overrides.
|
320
|
-
|
321
|
-
-
|
322
|
-
|
323
|
-
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
324
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
325
|
-
|
326
|
-
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
327
|
-
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
328
|
-
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
329
|
-
|
330
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
331
|
-
|
332
|
-
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
333
|
-
|
334
|
-
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
335
|
-
|
336
|
-
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
337
|
-
|
338
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
339
|
-
|
340
319
|
## iap.TunnelDestGroupIamPolicy
|
341
320
|
|
342
321
|
```python
|
@@ -617,27 +596,6 @@ class TunnelDestGroupIamPolicy(pulumi.CustomResource):
|
|
617
596
|
})
|
618
597
|
```
|
619
598
|
|
620
|
-
## This resource supports User Project Overrides.
|
621
|
-
|
622
|
-
-
|
623
|
-
|
624
|
-
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
625
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
626
|
-
|
627
|
-
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
628
|
-
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
629
|
-
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
630
|
-
|
631
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
632
|
-
|
633
|
-
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
634
|
-
|
635
|
-
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
636
|
-
|
637
|
-
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
638
|
-
|
639
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
640
|
-
|
641
599
|
## iap.TunnelDestGroupIamPolicy
|
642
600
|
|
643
601
|
```python
|
@@ -350,27 +350,6 @@ class TunnelIamBinding(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
-
## This resource supports User Project Overrides.
|
354
|
-
|
355
|
-
-
|
356
|
-
|
357
|
-
# IAM policy for Identity-Aware Proxy Tunnel
|
358
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
359
|
-
|
360
|
-
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
361
|
-
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
362
|
-
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
363
|
-
|
364
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
-
|
366
|
-
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
367
|
-
|
368
|
-
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
369
|
-
|
370
|
-
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
-
|
372
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
-
|
374
353
|
## iap.TunnelIamPolicy
|
375
354
|
|
376
355
|
```python
|
@@ -631,27 +610,6 @@ class TunnelIamBinding(pulumi.CustomResource):
|
|
631
610
|
})
|
632
611
|
```
|
633
612
|
|
634
|
-
## This resource supports User Project Overrides.
|
635
|
-
|
636
|
-
-
|
637
|
-
|
638
|
-
# IAM policy for Identity-Aware Proxy Tunnel
|
639
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
640
|
-
|
641
|
-
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
642
|
-
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
643
|
-
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
644
|
-
|
645
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
-
|
647
|
-
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
648
|
-
|
649
|
-
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
650
|
-
|
651
|
-
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
-
|
653
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
-
|
655
613
|
## iap.TunnelIamPolicy
|
656
614
|
|
657
615
|
```python
|
@@ -350,27 +350,6 @@ class TunnelIamMember(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
-
## This resource supports User Project Overrides.
|
354
|
-
|
355
|
-
-
|
356
|
-
|
357
|
-
# IAM policy for Identity-Aware Proxy Tunnel
|
358
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
359
|
-
|
360
|
-
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
361
|
-
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
362
|
-
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
363
|
-
|
364
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
-
|
366
|
-
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
367
|
-
|
368
|
-
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
369
|
-
|
370
|
-
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
-
|
372
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
-
|
374
353
|
## iap.TunnelIamPolicy
|
375
354
|
|
376
355
|
```python
|
@@ -631,27 +610,6 @@ class TunnelIamMember(pulumi.CustomResource):
|
|
631
610
|
})
|
632
611
|
```
|
633
612
|
|
634
|
-
## This resource supports User Project Overrides.
|
635
|
-
|
636
|
-
-
|
637
|
-
|
638
|
-
# IAM policy for Identity-Aware Proxy Tunnel
|
639
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
640
|
-
|
641
|
-
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
642
|
-
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
643
|
-
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
644
|
-
|
645
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
-
|
647
|
-
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
648
|
-
|
649
|
-
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
650
|
-
|
651
|
-
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
-
|
653
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
-
|
655
613
|
## iap.TunnelIamPolicy
|
656
614
|
|
657
615
|
```python
|
@@ -235,27 +235,6 @@ class TunnelIamPolicy(pulumi.CustomResource):
|
|
235
235
|
})
|
236
236
|
```
|
237
237
|
|
238
|
-
## This resource supports User Project Overrides.
|
239
|
-
|
240
|
-
-
|
241
|
-
|
242
|
-
# IAM policy for Identity-Aware Proxy Tunnel
|
243
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
244
|
-
|
245
|
-
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
246
|
-
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
247
|
-
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
248
|
-
|
249
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
250
|
-
|
251
|
-
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
252
|
-
|
253
|
-
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
254
|
-
|
255
|
-
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
256
|
-
|
257
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
258
|
-
|
259
238
|
## iap.TunnelIamPolicy
|
260
239
|
|
261
240
|
```python
|
@@ -502,27 +481,6 @@ class TunnelIamPolicy(pulumi.CustomResource):
|
|
502
481
|
})
|
503
482
|
```
|
504
483
|
|
505
|
-
## This resource supports User Project Overrides.
|
506
|
-
|
507
|
-
-
|
508
|
-
|
509
|
-
# IAM policy for Identity-Aware Proxy Tunnel
|
510
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
511
|
-
|
512
|
-
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
513
|
-
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
514
|
-
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
515
|
-
|
516
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
517
|
-
|
518
|
-
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
519
|
-
|
520
|
-
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
521
|
-
|
522
|
-
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
523
|
-
|
524
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
525
|
-
|
526
484
|
## iap.TunnelIamPolicy
|
527
485
|
|
528
486
|
```python
|
@@ -419,27 +419,6 @@ class TunnelInstanceIAMBinding(pulumi.CustomResource):
|
|
419
419
|
})
|
420
420
|
```
|
421
421
|
|
422
|
-
## This resource supports User Project Overrides.
|
423
|
-
|
424
|
-
-
|
425
|
-
|
426
|
-
# IAM policy for Identity-Aware Proxy TunnelInstance
|
427
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
428
|
-
|
429
|
-
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
430
|
-
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
431
|
-
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
432
|
-
|
433
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
434
|
-
|
435
|
-
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
436
|
-
|
437
|
-
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
438
|
-
|
439
|
-
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
440
|
-
|
441
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
442
|
-
|
443
422
|
## iap.TunnelInstanceIAMPolicy
|
444
423
|
|
445
424
|
```python
|
@@ -731,27 +710,6 @@ class TunnelInstanceIAMBinding(pulumi.CustomResource):
|
|
731
710
|
})
|
732
711
|
```
|
733
712
|
|
734
|
-
## This resource supports User Project Overrides.
|
735
|
-
|
736
|
-
-
|
737
|
-
|
738
|
-
# IAM policy for Identity-Aware Proxy TunnelInstance
|
739
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
740
|
-
|
741
|
-
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
742
|
-
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
743
|
-
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
744
|
-
|
745
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
746
|
-
|
747
|
-
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
748
|
-
|
749
|
-
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
750
|
-
|
751
|
-
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
752
|
-
|
753
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
754
|
-
|
755
713
|
## iap.TunnelInstanceIAMPolicy
|
756
714
|
|
757
715
|
```python
|
@@ -419,27 +419,6 @@ class TunnelInstanceIAMMember(pulumi.CustomResource):
|
|
419
419
|
})
|
420
420
|
```
|
421
421
|
|
422
|
-
## This resource supports User Project Overrides.
|
423
|
-
|
424
|
-
-
|
425
|
-
|
426
|
-
# IAM policy for Identity-Aware Proxy TunnelInstance
|
427
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
428
|
-
|
429
|
-
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
430
|
-
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
431
|
-
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
432
|
-
|
433
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
434
|
-
|
435
|
-
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
436
|
-
|
437
|
-
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
438
|
-
|
439
|
-
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
440
|
-
|
441
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
442
|
-
|
443
422
|
## iap.TunnelInstanceIAMPolicy
|
444
423
|
|
445
424
|
```python
|
@@ -731,27 +710,6 @@ class TunnelInstanceIAMMember(pulumi.CustomResource):
|
|
731
710
|
})
|
732
711
|
```
|
733
712
|
|
734
|
-
## This resource supports User Project Overrides.
|
735
|
-
|
736
|
-
-
|
737
|
-
|
738
|
-
# IAM policy for Identity-Aware Proxy TunnelInstance
|
739
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
740
|
-
|
741
|
-
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
742
|
-
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
743
|
-
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
744
|
-
|
745
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
746
|
-
|
747
|
-
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
748
|
-
|
749
|
-
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
750
|
-
|
751
|
-
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
752
|
-
|
753
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
754
|
-
|
755
713
|
## iap.TunnelInstanceIAMPolicy
|
756
714
|
|
757
715
|
```python
|