pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -388,27 +388,6 @@ class WebTypeAppEngingIamMember(pulumi.CustomResource):
|
|
388
388
|
})
|
389
389
|
```
|
390
390
|
|
391
|
-
## This resource supports User Project Overrides.
|
392
|
-
|
393
|
-
-
|
394
|
-
|
395
|
-
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
396
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
397
|
-
|
398
|
-
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
399
|
-
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
400
|
-
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
401
|
-
|
402
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
-
|
404
|
-
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
405
|
-
|
406
|
-
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
407
|
-
|
408
|
-
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
-
|
410
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
411
|
-
|
412
391
|
## iap.WebTypeAppEngingIamPolicy
|
413
392
|
|
414
393
|
```python
|
@@ -684,27 +663,6 @@ class WebTypeAppEngingIamMember(pulumi.CustomResource):
|
|
684
663
|
})
|
685
664
|
```
|
686
665
|
|
687
|
-
## This resource supports User Project Overrides.
|
688
|
-
|
689
|
-
-
|
690
|
-
|
691
|
-
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
692
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
693
|
-
|
694
|
-
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
695
|
-
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
696
|
-
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
697
|
-
|
698
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
699
|
-
|
700
|
-
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
701
|
-
|
702
|
-
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
703
|
-
|
704
|
-
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
705
|
-
|
706
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
707
|
-
|
708
666
|
## iap.WebTypeAppEngingIamPolicy
|
709
667
|
|
710
668
|
```python
|
@@ -273,27 +273,6 @@ class WebTypeAppEngingIamPolicy(pulumi.CustomResource):
|
|
273
273
|
})
|
274
274
|
```
|
275
275
|
|
276
|
-
## This resource supports User Project Overrides.
|
277
|
-
|
278
|
-
-
|
279
|
-
|
280
|
-
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
281
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
282
|
-
|
283
|
-
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
284
|
-
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
285
|
-
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
286
|
-
|
287
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
288
|
-
|
289
|
-
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
290
|
-
|
291
|
-
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
292
|
-
|
293
|
-
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
294
|
-
|
295
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
296
|
-
|
297
276
|
## iap.WebTypeAppEngingIamPolicy
|
298
277
|
|
299
278
|
```python
|
@@ -555,27 +534,6 @@ class WebTypeAppEngingIamPolicy(pulumi.CustomResource):
|
|
555
534
|
})
|
556
535
|
```
|
557
536
|
|
558
|
-
## This resource supports User Project Overrides.
|
559
|
-
|
560
|
-
-
|
561
|
-
|
562
|
-
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
563
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
564
|
-
|
565
|
-
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
566
|
-
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
567
|
-
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
568
|
-
|
569
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
-
|
571
|
-
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
572
|
-
|
573
|
-
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
574
|
-
|
575
|
-
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
-
|
577
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
578
|
-
|
579
537
|
## iap.WebTypeAppEngingIamPolicy
|
580
538
|
|
581
539
|
```python
|
@@ -350,27 +350,6 @@ class WebTypeComputeIamBinding(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
-
## This resource supports User Project Overrides.
|
354
|
-
|
355
|
-
-
|
356
|
-
|
357
|
-
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
358
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
359
|
-
|
360
|
-
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
361
|
-
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
362
|
-
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
363
|
-
|
364
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
-
|
366
|
-
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
367
|
-
|
368
|
-
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
369
|
-
|
370
|
-
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
-
|
372
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
-
|
374
353
|
## iap.WebTypeComputeIamPolicy
|
375
354
|
|
376
355
|
```python
|
@@ -631,27 +610,6 @@ class WebTypeComputeIamBinding(pulumi.CustomResource):
|
|
631
610
|
})
|
632
611
|
```
|
633
612
|
|
634
|
-
## This resource supports User Project Overrides.
|
635
|
-
|
636
|
-
-
|
637
|
-
|
638
|
-
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
639
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
640
|
-
|
641
|
-
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
642
|
-
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
643
|
-
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
644
|
-
|
645
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
-
|
647
|
-
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
648
|
-
|
649
|
-
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
650
|
-
|
651
|
-
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
-
|
653
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
-
|
655
613
|
## iap.WebTypeComputeIamPolicy
|
656
614
|
|
657
615
|
```python
|
@@ -350,27 +350,6 @@ class WebTypeComputeIamMember(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
-
## This resource supports User Project Overrides.
|
354
|
-
|
355
|
-
-
|
356
|
-
|
357
|
-
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
358
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
359
|
-
|
360
|
-
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
361
|
-
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
362
|
-
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
363
|
-
|
364
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
-
|
366
|
-
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
367
|
-
|
368
|
-
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
369
|
-
|
370
|
-
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
-
|
372
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
-
|
374
353
|
## iap.WebTypeComputeIamPolicy
|
375
354
|
|
376
355
|
```python
|
@@ -631,27 +610,6 @@ class WebTypeComputeIamMember(pulumi.CustomResource):
|
|
631
610
|
})
|
632
611
|
```
|
633
612
|
|
634
|
-
## This resource supports User Project Overrides.
|
635
|
-
|
636
|
-
-
|
637
|
-
|
638
|
-
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
639
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
640
|
-
|
641
|
-
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
642
|
-
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
643
|
-
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
644
|
-
|
645
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
-
|
647
|
-
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
648
|
-
|
649
|
-
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
650
|
-
|
651
|
-
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
-
|
653
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
-
|
655
613
|
## iap.WebTypeComputeIamPolicy
|
656
614
|
|
657
615
|
```python
|
@@ -235,27 +235,6 @@ class WebTypeComputeIamPolicy(pulumi.CustomResource):
|
|
235
235
|
})
|
236
236
|
```
|
237
237
|
|
238
|
-
## This resource supports User Project Overrides.
|
239
|
-
|
240
|
-
-
|
241
|
-
|
242
|
-
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
243
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
244
|
-
|
245
|
-
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
246
|
-
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
247
|
-
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
248
|
-
|
249
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
250
|
-
|
251
|
-
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
252
|
-
|
253
|
-
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
254
|
-
|
255
|
-
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
256
|
-
|
257
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
258
|
-
|
259
238
|
## iap.WebTypeComputeIamPolicy
|
260
239
|
|
261
240
|
```python
|
@@ -502,27 +481,6 @@ class WebTypeComputeIamPolicy(pulumi.CustomResource):
|
|
502
481
|
})
|
503
482
|
```
|
504
483
|
|
505
|
-
## This resource supports User Project Overrides.
|
506
|
-
|
507
|
-
-
|
508
|
-
|
509
|
-
# IAM policy for Identity-Aware Proxy WebTypeCompute
|
510
|
-
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
|
511
|
-
|
512
|
-
* `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
|
513
|
-
* `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
|
514
|
-
* `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
|
515
|
-
|
516
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
517
|
-
|
518
|
-
* `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
|
519
|
-
|
520
|
-
> **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
|
521
|
-
|
522
|
-
> **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
|
523
|
-
|
524
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
525
|
-
|
526
484
|
## iap.WebTypeComputeIamPolicy
|
527
485
|
|
528
486
|
```python
|
@@ -347,6 +347,47 @@ class KeyRingIAMBinding(pulumi.CustomResource):
|
|
347
347
|
})
|
348
348
|
```
|
349
349
|
|
350
|
+
## kms.KeyRingIAMPolicy
|
351
|
+
|
352
|
+
```python
|
353
|
+
import pulumi
|
354
|
+
import pulumi_gcp as gcp
|
355
|
+
|
356
|
+
keyring = gcp.kms.KeyRing("keyring",
|
357
|
+
name="keyring-example",
|
358
|
+
location="global")
|
359
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
360
|
+
"role": "roles/editor",
|
361
|
+
"members": ["user:jane@example.com"],
|
362
|
+
}])
|
363
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
364
|
+
key_ring_id=keyring.id,
|
365
|
+
policy_data=admin.policy_data)
|
366
|
+
```
|
367
|
+
|
368
|
+
With IAM Conditions:
|
369
|
+
|
370
|
+
```python
|
371
|
+
import pulumi
|
372
|
+
import pulumi_gcp as gcp
|
373
|
+
|
374
|
+
keyring = gcp.kms.KeyRing("keyring",
|
375
|
+
name="keyring-example",
|
376
|
+
location="global")
|
377
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
378
|
+
"role": "roles/editor",
|
379
|
+
"members": ["user:jane@example.com"],
|
380
|
+
"condition": {
|
381
|
+
"title": "expires_after_2019_12_31",
|
382
|
+
"description": "Expiring at midnight of 2019-12-31",
|
383
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
384
|
+
},
|
385
|
+
}])
|
386
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
387
|
+
key_ring_id=keyring.id,
|
388
|
+
policy_data=admin.policy_data)
|
389
|
+
```
|
390
|
+
|
350
391
|
## kms.KeyRingIAMBinding
|
351
392
|
|
352
393
|
```python
|
@@ -567,6 +608,47 @@ class KeyRingIAMBinding(pulumi.CustomResource):
|
|
567
608
|
})
|
568
609
|
```
|
569
610
|
|
611
|
+
## kms.KeyRingIAMPolicy
|
612
|
+
|
613
|
+
```python
|
614
|
+
import pulumi
|
615
|
+
import pulumi_gcp as gcp
|
616
|
+
|
617
|
+
keyring = gcp.kms.KeyRing("keyring",
|
618
|
+
name="keyring-example",
|
619
|
+
location="global")
|
620
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
621
|
+
"role": "roles/editor",
|
622
|
+
"members": ["user:jane@example.com"],
|
623
|
+
}])
|
624
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
625
|
+
key_ring_id=keyring.id,
|
626
|
+
policy_data=admin.policy_data)
|
627
|
+
```
|
628
|
+
|
629
|
+
With IAM Conditions:
|
630
|
+
|
631
|
+
```python
|
632
|
+
import pulumi
|
633
|
+
import pulumi_gcp as gcp
|
634
|
+
|
635
|
+
keyring = gcp.kms.KeyRing("keyring",
|
636
|
+
name="keyring-example",
|
637
|
+
location="global")
|
638
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
639
|
+
"role": "roles/editor",
|
640
|
+
"members": ["user:jane@example.com"],
|
641
|
+
"condition": {
|
642
|
+
"title": "expires_after_2019_12_31",
|
643
|
+
"description": "Expiring at midnight of 2019-12-31",
|
644
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
645
|
+
},
|
646
|
+
}])
|
647
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
648
|
+
key_ring_id=keyring.id,
|
649
|
+
policy_data=admin.policy_data)
|
650
|
+
```
|
651
|
+
|
570
652
|
## kms.KeyRingIAMBinding
|
571
653
|
|
572
654
|
```python
|
@@ -347,6 +347,47 @@ class KeyRingIAMMember(pulumi.CustomResource):
|
|
347
347
|
})
|
348
348
|
```
|
349
349
|
|
350
|
+
## kms.KeyRingIAMPolicy
|
351
|
+
|
352
|
+
```python
|
353
|
+
import pulumi
|
354
|
+
import pulumi_gcp as gcp
|
355
|
+
|
356
|
+
keyring = gcp.kms.KeyRing("keyring",
|
357
|
+
name="keyring-example",
|
358
|
+
location="global")
|
359
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
360
|
+
"role": "roles/editor",
|
361
|
+
"members": ["user:jane@example.com"],
|
362
|
+
}])
|
363
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
364
|
+
key_ring_id=keyring.id,
|
365
|
+
policy_data=admin.policy_data)
|
366
|
+
```
|
367
|
+
|
368
|
+
With IAM Conditions:
|
369
|
+
|
370
|
+
```python
|
371
|
+
import pulumi
|
372
|
+
import pulumi_gcp as gcp
|
373
|
+
|
374
|
+
keyring = gcp.kms.KeyRing("keyring",
|
375
|
+
name="keyring-example",
|
376
|
+
location="global")
|
377
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
378
|
+
"role": "roles/editor",
|
379
|
+
"members": ["user:jane@example.com"],
|
380
|
+
"condition": {
|
381
|
+
"title": "expires_after_2019_12_31",
|
382
|
+
"description": "Expiring at midnight of 2019-12-31",
|
383
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
384
|
+
},
|
385
|
+
}])
|
386
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
387
|
+
key_ring_id=keyring.id,
|
388
|
+
policy_data=admin.policy_data)
|
389
|
+
```
|
390
|
+
|
350
391
|
## kms.KeyRingIAMBinding
|
351
392
|
|
352
393
|
```python
|
@@ -567,6 +608,47 @@ class KeyRingIAMMember(pulumi.CustomResource):
|
|
567
608
|
})
|
568
609
|
```
|
569
610
|
|
611
|
+
## kms.KeyRingIAMPolicy
|
612
|
+
|
613
|
+
```python
|
614
|
+
import pulumi
|
615
|
+
import pulumi_gcp as gcp
|
616
|
+
|
617
|
+
keyring = gcp.kms.KeyRing("keyring",
|
618
|
+
name="keyring-example",
|
619
|
+
location="global")
|
620
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
621
|
+
"role": "roles/editor",
|
622
|
+
"members": ["user:jane@example.com"],
|
623
|
+
}])
|
624
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
625
|
+
key_ring_id=keyring.id,
|
626
|
+
policy_data=admin.policy_data)
|
627
|
+
```
|
628
|
+
|
629
|
+
With IAM Conditions:
|
630
|
+
|
631
|
+
```python
|
632
|
+
import pulumi
|
633
|
+
import pulumi_gcp as gcp
|
634
|
+
|
635
|
+
keyring = gcp.kms.KeyRing("keyring",
|
636
|
+
name="keyring-example",
|
637
|
+
location="global")
|
638
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
639
|
+
"role": "roles/editor",
|
640
|
+
"members": ["user:jane@example.com"],
|
641
|
+
"condition": {
|
642
|
+
"title": "expires_after_2019_12_31",
|
643
|
+
"description": "Expiring at midnight of 2019-12-31",
|
644
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
645
|
+
},
|
646
|
+
}])
|
647
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
648
|
+
key_ring_id=keyring.id,
|
649
|
+
policy_data=admin.policy_data)
|
650
|
+
```
|
651
|
+
|
570
652
|
## kms.KeyRingIAMBinding
|
571
653
|
|
572
654
|
```python
|
@@ -244,6 +244,47 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
|
|
244
244
|
})
|
245
245
|
```
|
246
246
|
|
247
|
+
## kms.KeyRingIAMPolicy
|
248
|
+
|
249
|
+
```python
|
250
|
+
import pulumi
|
251
|
+
import pulumi_gcp as gcp
|
252
|
+
|
253
|
+
keyring = gcp.kms.KeyRing("keyring",
|
254
|
+
name="keyring-example",
|
255
|
+
location="global")
|
256
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
257
|
+
"role": "roles/editor",
|
258
|
+
"members": ["user:jane@example.com"],
|
259
|
+
}])
|
260
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
261
|
+
key_ring_id=keyring.id,
|
262
|
+
policy_data=admin.policy_data)
|
263
|
+
```
|
264
|
+
|
265
|
+
With IAM Conditions:
|
266
|
+
|
267
|
+
```python
|
268
|
+
import pulumi
|
269
|
+
import pulumi_gcp as gcp
|
270
|
+
|
271
|
+
keyring = gcp.kms.KeyRing("keyring",
|
272
|
+
name="keyring-example",
|
273
|
+
location="global")
|
274
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
275
|
+
"role": "roles/editor",
|
276
|
+
"members": ["user:jane@example.com"],
|
277
|
+
"condition": {
|
278
|
+
"title": "expires_after_2019_12_31",
|
279
|
+
"description": "Expiring at midnight of 2019-12-31",
|
280
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
281
|
+
},
|
282
|
+
}])
|
283
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
284
|
+
key_ring_id=keyring.id,
|
285
|
+
policy_data=admin.policy_data)
|
286
|
+
```
|
287
|
+
|
247
288
|
## kms.KeyRingIAMBinding
|
248
289
|
|
249
290
|
```python
|
@@ -453,6 +494,47 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
|
|
453
494
|
})
|
454
495
|
```
|
455
496
|
|
497
|
+
## kms.KeyRingIAMPolicy
|
498
|
+
|
499
|
+
```python
|
500
|
+
import pulumi
|
501
|
+
import pulumi_gcp as gcp
|
502
|
+
|
503
|
+
keyring = gcp.kms.KeyRing("keyring",
|
504
|
+
name="keyring-example",
|
505
|
+
location="global")
|
506
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
507
|
+
"role": "roles/editor",
|
508
|
+
"members": ["user:jane@example.com"],
|
509
|
+
}])
|
510
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
511
|
+
key_ring_id=keyring.id,
|
512
|
+
policy_data=admin.policy_data)
|
513
|
+
```
|
514
|
+
|
515
|
+
With IAM Conditions:
|
516
|
+
|
517
|
+
```python
|
518
|
+
import pulumi
|
519
|
+
import pulumi_gcp as gcp
|
520
|
+
|
521
|
+
keyring = gcp.kms.KeyRing("keyring",
|
522
|
+
name="keyring-example",
|
523
|
+
location="global")
|
524
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
525
|
+
"role": "roles/editor",
|
526
|
+
"members": ["user:jane@example.com"],
|
527
|
+
"condition": {
|
528
|
+
"title": "expires_after_2019_12_31",
|
529
|
+
"description": "Expiring at midnight of 2019-12-31",
|
530
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
531
|
+
},
|
532
|
+
}])
|
533
|
+
key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
|
534
|
+
key_ring_id=keyring.id,
|
535
|
+
policy_data=admin.policy_data)
|
536
|
+
```
|
537
|
+
|
456
538
|
## kms.KeyRingIAMBinding
|
457
539
|
|
458
540
|
```python
|
@@ -363,25 +363,6 @@ class InstanceIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for Cloud AI Notebooks Instance
|
371
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
374
|
-
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
375
|
-
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
380
|
-
|
381
|
-
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## notebooks.InstanceIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -554,25 +535,6 @@ class InstanceIamBinding(pulumi.CustomResource):
|
|
554
535
|
member="user:jane@example.com")
|
555
536
|
```
|
556
537
|
|
557
|
-
## This resource supports User Project Overrides.
|
558
|
-
|
559
|
-
-
|
560
|
-
|
561
|
-
# IAM policy for Cloud AI Notebooks Instance
|
562
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
563
|
-
|
564
|
-
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
565
|
-
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
566
|
-
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
567
|
-
|
568
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
-
|
570
|
-
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
571
|
-
|
572
|
-
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
573
|
-
|
574
|
-
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
-
|
576
538
|
## notebooks.InstanceIamPolicy
|
577
539
|
|
578
540
|
```python
|