pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -363,25 +363,6 @@ class InstanceIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for Cloud AI Notebooks Instance
|
371
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
374
|
-
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
375
|
-
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
380
|
-
|
381
|
-
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## notebooks.InstanceIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -554,25 +535,6 @@ class InstanceIamMember(pulumi.CustomResource):
|
|
554
535
|
member="user:jane@example.com")
|
555
536
|
```
|
556
537
|
|
557
|
-
## This resource supports User Project Overrides.
|
558
|
-
|
559
|
-
-
|
560
|
-
|
561
|
-
# IAM policy for Cloud AI Notebooks Instance
|
562
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
563
|
-
|
564
|
-
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
565
|
-
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
566
|
-
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
567
|
-
|
568
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
-
|
570
|
-
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
571
|
-
|
572
|
-
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
573
|
-
|
574
|
-
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
-
|
576
538
|
## notebooks.InstanceIamPolicy
|
577
539
|
|
578
540
|
```python
|
@@ -260,25 +260,6 @@ class InstanceIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
-
## This resource supports User Project Overrides.
|
264
|
-
|
265
|
-
-
|
266
|
-
|
267
|
-
# IAM policy for Cloud AI Notebooks Instance
|
268
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
269
|
-
|
270
|
-
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
271
|
-
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
272
|
-
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
273
|
-
|
274
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
-
|
276
|
-
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
277
|
-
|
278
|
-
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
279
|
-
|
280
|
-
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
-
|
282
263
|
## notebooks.InstanceIamPolicy
|
283
264
|
|
284
265
|
```python
|
@@ -439,25 +420,6 @@ class InstanceIamPolicy(pulumi.CustomResource):
|
|
439
420
|
member="user:jane@example.com")
|
440
421
|
```
|
441
422
|
|
442
|
-
## This resource supports User Project Overrides.
|
443
|
-
|
444
|
-
-
|
445
|
-
|
446
|
-
# IAM policy for Cloud AI Notebooks Instance
|
447
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
448
|
-
|
449
|
-
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
450
|
-
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
451
|
-
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
452
|
-
|
453
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
-
|
455
|
-
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
456
|
-
|
457
|
-
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
458
|
-
|
459
|
-
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
460
|
-
|
461
423
|
## notebooks.InstanceIamPolicy
|
462
424
|
|
463
425
|
```python
|
@@ -363,25 +363,6 @@ class RuntimeIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for Cloud AI Notebooks Runtime
|
371
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
374
|
-
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
375
|
-
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
380
|
-
|
381
|
-
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## notebooks.RuntimeIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -554,25 +535,6 @@ class RuntimeIamBinding(pulumi.CustomResource):
|
|
554
535
|
member="user:jane@example.com")
|
555
536
|
```
|
556
537
|
|
557
|
-
## This resource supports User Project Overrides.
|
558
|
-
|
559
|
-
-
|
560
|
-
|
561
|
-
# IAM policy for Cloud AI Notebooks Runtime
|
562
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
563
|
-
|
564
|
-
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
565
|
-
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
566
|
-
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
567
|
-
|
568
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
-
|
570
|
-
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
571
|
-
|
572
|
-
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
573
|
-
|
574
|
-
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
-
|
576
538
|
## notebooks.RuntimeIamPolicy
|
577
539
|
|
578
540
|
```python
|
@@ -363,25 +363,6 @@ class RuntimeIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
-
## This resource supports User Project Overrides.
|
367
|
-
|
368
|
-
-
|
369
|
-
|
370
|
-
# IAM policy for Cloud AI Notebooks Runtime
|
371
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
372
|
-
|
373
|
-
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
374
|
-
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
375
|
-
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
376
|
-
|
377
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
-
|
379
|
-
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
380
|
-
|
381
|
-
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
382
|
-
|
383
|
-
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
-
|
385
366
|
## notebooks.RuntimeIamPolicy
|
386
367
|
|
387
368
|
```python
|
@@ -554,25 +535,6 @@ class RuntimeIamMember(pulumi.CustomResource):
|
|
554
535
|
member="user:jane@example.com")
|
555
536
|
```
|
556
537
|
|
557
|
-
## This resource supports User Project Overrides.
|
558
|
-
|
559
|
-
-
|
560
|
-
|
561
|
-
# IAM policy for Cloud AI Notebooks Runtime
|
562
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
563
|
-
|
564
|
-
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
565
|
-
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
566
|
-
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
567
|
-
|
568
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
-
|
570
|
-
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
571
|
-
|
572
|
-
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
573
|
-
|
574
|
-
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
-
|
576
538
|
## notebooks.RuntimeIamPolicy
|
577
539
|
|
578
540
|
```python
|
@@ -260,25 +260,6 @@ class RuntimeIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
-
## This resource supports User Project Overrides.
|
264
|
-
|
265
|
-
-
|
266
|
-
|
267
|
-
# IAM policy for Cloud AI Notebooks Runtime
|
268
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
269
|
-
|
270
|
-
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
271
|
-
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
272
|
-
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
273
|
-
|
274
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
-
|
276
|
-
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
277
|
-
|
278
|
-
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
279
|
-
|
280
|
-
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
-
|
282
263
|
## notebooks.RuntimeIamPolicy
|
283
264
|
|
284
265
|
```python
|
@@ -439,25 +420,6 @@ class RuntimeIamPolicy(pulumi.CustomResource):
|
|
439
420
|
member="user:jane@example.com")
|
440
421
|
```
|
441
422
|
|
442
|
-
## This resource supports User Project Overrides.
|
443
|
-
|
444
|
-
-
|
445
|
-
|
446
|
-
# IAM policy for Cloud AI Notebooks Runtime
|
447
|
-
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
448
|
-
|
449
|
-
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
450
|
-
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
451
|
-
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
452
|
-
|
453
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
-
|
455
|
-
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
456
|
-
|
457
|
-
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
458
|
-
|
459
|
-
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
460
|
-
|
461
423
|
## notebooks.RuntimeIamPolicy
|
462
424
|
|
463
425
|
```python
|
@@ -356,6 +356,53 @@ class IAMMember(pulumi.CustomResource):
|
|
356
356
|
])
|
357
357
|
```
|
358
358
|
|
359
|
+
## organizations.IAMPolicy
|
360
|
+
|
361
|
+
!> **Warning:** New organizations have several default policies which will,
|
362
|
+
without extreme caution, be **overwritten** by use of this resource.
|
363
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
364
|
+
resources. This resource makes it easy to remove your own access to
|
365
|
+
an organization, which will require a call to Google Support to have
|
366
|
+
fixed, and can take multiple days to resolve.
|
367
|
+
|
368
|
+
In general, this resource should only be used with organizations
|
369
|
+
fully managed by this provider.I f you do use this resource,
|
370
|
+
the best way to be sure that you are not making dangerous changes is to start
|
371
|
+
by **importing** your existing policy, and examining the diff very closely.
|
372
|
+
|
373
|
+
```python
|
374
|
+
import pulumi
|
375
|
+
import pulumi_gcp as gcp
|
376
|
+
|
377
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
378
|
+
"role": "roles/editor",
|
379
|
+
"members": ["user:jane@example.com"],
|
380
|
+
}])
|
381
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
382
|
+
org_id="1234567890",
|
383
|
+
policy_data=admin.policy_data)
|
384
|
+
```
|
385
|
+
|
386
|
+
With IAM Conditions:
|
387
|
+
|
388
|
+
```python
|
389
|
+
import pulumi
|
390
|
+
import pulumi_gcp as gcp
|
391
|
+
|
392
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
393
|
+
"role": "roles/editor",
|
394
|
+
"members": ["user:jane@example.com"],
|
395
|
+
"condition": {
|
396
|
+
"title": "expires_after_2019_12_31",
|
397
|
+
"description": "Expiring at midnight of 2019-12-31",
|
398
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
399
|
+
},
|
400
|
+
}])
|
401
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
402
|
+
org_id="1234567890",
|
403
|
+
policy_data=admin.policy_data)
|
404
|
+
```
|
405
|
+
|
359
406
|
## organizations.IAMBinding
|
360
407
|
|
361
408
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -622,6 +669,53 @@ class IAMMember(pulumi.CustomResource):
|
|
622
669
|
])
|
623
670
|
```
|
624
671
|
|
672
|
+
## organizations.IAMPolicy
|
673
|
+
|
674
|
+
!> **Warning:** New organizations have several default policies which will,
|
675
|
+
without extreme caution, be **overwritten** by use of this resource.
|
676
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
677
|
+
resources. This resource makes it easy to remove your own access to
|
678
|
+
an organization, which will require a call to Google Support to have
|
679
|
+
fixed, and can take multiple days to resolve.
|
680
|
+
|
681
|
+
In general, this resource should only be used with organizations
|
682
|
+
fully managed by this provider.I f you do use this resource,
|
683
|
+
the best way to be sure that you are not making dangerous changes is to start
|
684
|
+
by **importing** your existing policy, and examining the diff very closely.
|
685
|
+
|
686
|
+
```python
|
687
|
+
import pulumi
|
688
|
+
import pulumi_gcp as gcp
|
689
|
+
|
690
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
691
|
+
"role": "roles/editor",
|
692
|
+
"members": ["user:jane@example.com"],
|
693
|
+
}])
|
694
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
695
|
+
org_id="1234567890",
|
696
|
+
policy_data=admin.policy_data)
|
697
|
+
```
|
698
|
+
|
699
|
+
With IAM Conditions:
|
700
|
+
|
701
|
+
```python
|
702
|
+
import pulumi
|
703
|
+
import pulumi_gcp as gcp
|
704
|
+
|
705
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
706
|
+
"role": "roles/editor",
|
707
|
+
"members": ["user:jane@example.com"],
|
708
|
+
"condition": {
|
709
|
+
"title": "expires_after_2019_12_31",
|
710
|
+
"description": "Expiring at midnight of 2019-12-31",
|
711
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
712
|
+
},
|
713
|
+
}])
|
714
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
715
|
+
org_id="1234567890",
|
716
|
+
policy_data=admin.policy_data)
|
717
|
+
```
|
718
|
+
|
625
719
|
## organizations.IAMBinding
|
626
720
|
|
627
721
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -285,6 +285,53 @@ class IAMPolicy(pulumi.CustomResource):
|
|
285
285
|
])
|
286
286
|
```
|
287
287
|
|
288
|
+
## organizations.IAMPolicy
|
289
|
+
|
290
|
+
!> **Warning:** New organizations have several default policies which will,
|
291
|
+
without extreme caution, be **overwritten** by use of this resource.
|
292
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
293
|
+
resources. This resource makes it easy to remove your own access to
|
294
|
+
an organization, which will require a call to Google Support to have
|
295
|
+
fixed, and can take multiple days to resolve.
|
296
|
+
|
297
|
+
In general, this resource should only be used with organizations
|
298
|
+
fully managed by this provider.I f you do use this resource,
|
299
|
+
the best way to be sure that you are not making dangerous changes is to start
|
300
|
+
by **importing** your existing policy, and examining the diff very closely.
|
301
|
+
|
302
|
+
```python
|
303
|
+
import pulumi
|
304
|
+
import pulumi_gcp as gcp
|
305
|
+
|
306
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
307
|
+
"role": "roles/editor",
|
308
|
+
"members": ["user:jane@example.com"],
|
309
|
+
}])
|
310
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
311
|
+
org_id="1234567890",
|
312
|
+
policy_data=admin.policy_data)
|
313
|
+
```
|
314
|
+
|
315
|
+
With IAM Conditions:
|
316
|
+
|
317
|
+
```python
|
318
|
+
import pulumi
|
319
|
+
import pulumi_gcp as gcp
|
320
|
+
|
321
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
322
|
+
"role": "roles/editor",
|
323
|
+
"members": ["user:jane@example.com"],
|
324
|
+
"condition": {
|
325
|
+
"title": "expires_after_2019_12_31",
|
326
|
+
"description": "Expiring at midnight of 2019-12-31",
|
327
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
328
|
+
},
|
329
|
+
}])
|
330
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
331
|
+
org_id="1234567890",
|
332
|
+
policy_data=admin.policy_data)
|
333
|
+
```
|
334
|
+
|
288
335
|
## organizations.IAMBinding
|
289
336
|
|
290
337
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -548,6 +595,53 @@ class IAMPolicy(pulumi.CustomResource):
|
|
548
595
|
])
|
549
596
|
```
|
550
597
|
|
598
|
+
## organizations.IAMPolicy
|
599
|
+
|
600
|
+
!> **Warning:** New organizations have several default policies which will,
|
601
|
+
without extreme caution, be **overwritten** by use of this resource.
|
602
|
+
The safest alternative is to use multiple `organizations.IAMBinding`
|
603
|
+
resources. This resource makes it easy to remove your own access to
|
604
|
+
an organization, which will require a call to Google Support to have
|
605
|
+
fixed, and can take multiple days to resolve.
|
606
|
+
|
607
|
+
In general, this resource should only be used with organizations
|
608
|
+
fully managed by this provider.I f you do use this resource,
|
609
|
+
the best way to be sure that you are not making dangerous changes is to start
|
610
|
+
by **importing** your existing policy, and examining the diff very closely.
|
611
|
+
|
612
|
+
```python
|
613
|
+
import pulumi
|
614
|
+
import pulumi_gcp as gcp
|
615
|
+
|
616
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
617
|
+
"role": "roles/editor",
|
618
|
+
"members": ["user:jane@example.com"],
|
619
|
+
}])
|
620
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
621
|
+
org_id="1234567890",
|
622
|
+
policy_data=admin.policy_data)
|
623
|
+
```
|
624
|
+
|
625
|
+
With IAM Conditions:
|
626
|
+
|
627
|
+
```python
|
628
|
+
import pulumi
|
629
|
+
import pulumi_gcp as gcp
|
630
|
+
|
631
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
632
|
+
"role": "roles/editor",
|
633
|
+
"members": ["user:jane@example.com"],
|
634
|
+
"condition": {
|
635
|
+
"title": "expires_after_2019_12_31",
|
636
|
+
"description": "Expiring at midnight of 2019-12-31",
|
637
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
638
|
+
},
|
639
|
+
}])
|
640
|
+
organization = gcp.organizations.IAMPolicy("organization",
|
641
|
+
org_id="1234567890",
|
642
|
+
policy_data=admin.policy_data)
|
643
|
+
```
|
644
|
+
|
551
645
|
## organizations.IAMBinding
|
552
646
|
|
553
647
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -319,25 +319,6 @@ class SchemaIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud Pub/Sub Schema
|
327
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
330
|
-
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
331
|
-
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
336
|
-
|
337
|
-
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## pubsub.SchemaIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class SchemaIamBinding(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Cloud Pub/Sub Schema
|
507
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
510
|
-
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
511
|
-
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
516
|
-
|
517
|
-
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## pubsub.SchemaIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -319,25 +319,6 @@ class SchemaIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
-
## This resource supports User Project Overrides.
|
323
|
-
|
324
|
-
-
|
325
|
-
|
326
|
-
# IAM policy for Cloud Pub/Sub Schema
|
327
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
328
|
-
|
329
|
-
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
330
|
-
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
331
|
-
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
332
|
-
|
333
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
-
|
335
|
-
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
336
|
-
|
337
|
-
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
338
|
-
|
339
|
-
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
-
|
341
322
|
## pubsub.SchemaIamPolicy
|
342
323
|
|
343
324
|
```python
|
@@ -499,25 +480,6 @@ class SchemaIamMember(pulumi.CustomResource):
|
|
499
480
|
member="user:jane@example.com")
|
500
481
|
```
|
501
482
|
|
502
|
-
## This resource supports User Project Overrides.
|
503
|
-
|
504
|
-
-
|
505
|
-
|
506
|
-
# IAM policy for Cloud Pub/Sub Schema
|
507
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
508
|
-
|
509
|
-
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
510
|
-
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
511
|
-
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
512
|
-
|
513
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
-
|
515
|
-
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
516
|
-
|
517
|
-
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
518
|
-
|
519
|
-
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
-
|
521
483
|
## pubsub.SchemaIamPolicy
|
522
484
|
|
523
485
|
```python
|
@@ -216,25 +216,6 @@ class SchemaIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
-
## This resource supports User Project Overrides.
|
220
|
-
|
221
|
-
-
|
222
|
-
|
223
|
-
# IAM policy for Cloud Pub/Sub Schema
|
224
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
225
|
-
|
226
|
-
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
227
|
-
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
228
|
-
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
229
|
-
|
230
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
-
|
232
|
-
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
233
|
-
|
234
|
-
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
235
|
-
|
236
|
-
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
-
|
238
219
|
## pubsub.SchemaIamPolicy
|
239
220
|
|
240
221
|
```python
|
@@ -384,25 +365,6 @@ class SchemaIamPolicy(pulumi.CustomResource):
|
|
384
365
|
member="user:jane@example.com")
|
385
366
|
```
|
386
367
|
|
387
|
-
## This resource supports User Project Overrides.
|
388
|
-
|
389
|
-
-
|
390
|
-
|
391
|
-
# IAM policy for Cloud Pub/Sub Schema
|
392
|
-
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
393
|
-
|
394
|
-
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
395
|
-
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
396
|
-
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
397
|
-
|
398
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
-
|
400
|
-
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
401
|
-
|
402
|
-
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
403
|
-
|
404
|
-
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
-
|
406
368
|
## pubsub.SchemaIamPolicy
|
407
369
|
|
408
370
|
```python
|