pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -306,26 +306,6 @@ class EnvironmentIamBinding(pulumi.CustomResource):
|
|
306
306
|
member="user:jane@example.com")
|
307
307
|
```
|
308
308
|
|
309
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
310
|
-
|
311
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
312
|
-
---
|
313
|
-
|
314
|
-
# IAM policy for Apigee Environment
|
315
|
-
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
316
|
-
|
317
|
-
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
318
|
-
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
319
|
-
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
320
|
-
|
321
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
322
|
-
|
323
|
-
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
324
|
-
|
325
|
-
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
326
|
-
|
327
|
-
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
328
|
-
|
329
309
|
## apigee.EnvironmentIamPolicy
|
330
310
|
|
331
311
|
```python
|
@@ -483,26 +463,6 @@ class EnvironmentIamBinding(pulumi.CustomResource):
|
|
483
463
|
member="user:jane@example.com")
|
484
464
|
```
|
485
465
|
|
486
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
487
|
-
|
488
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
489
|
-
---
|
490
|
-
|
491
|
-
# IAM policy for Apigee Environment
|
492
|
-
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
493
|
-
|
494
|
-
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
495
|
-
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
496
|
-
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
497
|
-
|
498
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
499
|
-
|
500
|
-
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
501
|
-
|
502
|
-
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
503
|
-
|
504
|
-
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
505
|
-
|
506
466
|
## apigee.EnvironmentIamPolicy
|
507
467
|
|
508
468
|
```python
|
@@ -306,26 +306,6 @@ class EnvironmentIamMember(pulumi.CustomResource):
|
|
306
306
|
member="user:jane@example.com")
|
307
307
|
```
|
308
308
|
|
309
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
310
|
-
|
311
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
312
|
-
---
|
313
|
-
|
314
|
-
# IAM policy for Apigee Environment
|
315
|
-
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
316
|
-
|
317
|
-
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
318
|
-
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
319
|
-
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
320
|
-
|
321
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
322
|
-
|
323
|
-
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
324
|
-
|
325
|
-
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
326
|
-
|
327
|
-
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
328
|
-
|
329
309
|
## apigee.EnvironmentIamPolicy
|
330
310
|
|
331
311
|
```python
|
@@ -483,26 +463,6 @@ class EnvironmentIamMember(pulumi.CustomResource):
|
|
483
463
|
member="user:jane@example.com")
|
484
464
|
```
|
485
465
|
|
486
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
487
|
-
|
488
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
489
|
-
---
|
490
|
-
|
491
|
-
# IAM policy for Apigee Environment
|
492
|
-
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
493
|
-
|
494
|
-
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
495
|
-
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
496
|
-
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
497
|
-
|
498
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
499
|
-
|
500
|
-
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
501
|
-
|
502
|
-
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
503
|
-
|
504
|
-
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
505
|
-
|
506
466
|
## apigee.EnvironmentIamPolicy
|
507
467
|
|
508
468
|
```python
|
@@ -203,26 +203,6 @@ class EnvironmentIamPolicy(pulumi.CustomResource):
|
|
203
203
|
member="user:jane@example.com")
|
204
204
|
```
|
205
205
|
|
206
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
207
|
-
|
208
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
209
|
-
---
|
210
|
-
|
211
|
-
# IAM policy for Apigee Environment
|
212
|
-
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
213
|
-
|
214
|
-
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
215
|
-
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
216
|
-
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
217
|
-
|
218
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
219
|
-
|
220
|
-
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
221
|
-
|
222
|
-
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
223
|
-
|
224
|
-
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
225
|
-
|
226
206
|
## apigee.EnvironmentIamPolicy
|
227
207
|
|
228
208
|
```python
|
@@ -368,26 +348,6 @@ class EnvironmentIamPolicy(pulumi.CustomResource):
|
|
368
348
|
member="user:jane@example.com")
|
369
349
|
```
|
370
350
|
|
371
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
372
|
-
|
373
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
374
|
-
---
|
375
|
-
|
376
|
-
# IAM policy for Apigee Environment
|
377
|
-
Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
|
378
|
-
|
379
|
-
* `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
|
380
|
-
* `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
|
381
|
-
* `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
|
382
|
-
|
383
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
384
|
-
|
385
|
-
* `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
|
386
|
-
|
387
|
-
> **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
|
388
|
-
|
389
|
-
> **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
|
390
|
-
|
391
351
|
## apigee.EnvironmentIamPolicy
|
392
352
|
|
393
353
|
```python
|
@@ -367,25 +367,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
-
## This resource supports User Project Overrides.
|
371
|
-
|
372
|
-
-
|
373
|
-
|
374
|
-
# IAM policy for Artifact Registry Repository
|
375
|
-
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
376
|
-
|
377
|
-
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
378
|
-
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
379
|
-
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
380
|
-
|
381
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
-
|
383
|
-
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
384
|
-
|
385
|
-
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
386
|
-
|
387
|
-
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
-
|
389
370
|
## artifactregistry.RepositoryIamPolicy
|
390
371
|
|
391
372
|
```python
|
@@ -559,25 +540,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
559
540
|
member="user:jane@example.com")
|
560
541
|
```
|
561
542
|
|
562
|
-
## This resource supports User Project Overrides.
|
563
|
-
|
564
|
-
-
|
565
|
-
|
566
|
-
# IAM policy for Artifact Registry Repository
|
567
|
-
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
568
|
-
|
569
|
-
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
570
|
-
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
571
|
-
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
572
|
-
|
573
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
-
|
575
|
-
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
576
|
-
|
577
|
-
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
578
|
-
|
579
|
-
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
-
|
581
543
|
## artifactregistry.RepositoryIamPolicy
|
582
544
|
|
583
545
|
```python
|
@@ -367,25 +367,6 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
-
## This resource supports User Project Overrides.
|
371
|
-
|
372
|
-
-
|
373
|
-
|
374
|
-
# IAM policy for Artifact Registry Repository
|
375
|
-
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
376
|
-
|
377
|
-
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
378
|
-
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
379
|
-
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
380
|
-
|
381
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
-
|
383
|
-
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
384
|
-
|
385
|
-
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
386
|
-
|
387
|
-
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
-
|
389
370
|
## artifactregistry.RepositoryIamPolicy
|
390
371
|
|
391
372
|
```python
|
@@ -559,25 +540,6 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
559
540
|
member="user:jane@example.com")
|
560
541
|
```
|
561
542
|
|
562
|
-
## This resource supports User Project Overrides.
|
563
|
-
|
564
|
-
-
|
565
|
-
|
566
|
-
# IAM policy for Artifact Registry Repository
|
567
|
-
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
568
|
-
|
569
|
-
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
570
|
-
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
571
|
-
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
572
|
-
|
573
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
-
|
575
|
-
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
576
|
-
|
577
|
-
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
578
|
-
|
579
|
-
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
-
|
581
543
|
## artifactregistry.RepositoryIamPolicy
|
582
544
|
|
583
545
|
```python
|
@@ -264,25 +264,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
264
264
|
member="user:jane@example.com")
|
265
265
|
```
|
266
266
|
|
267
|
-
## This resource supports User Project Overrides.
|
268
|
-
|
269
|
-
-
|
270
|
-
|
271
|
-
# IAM policy for Artifact Registry Repository
|
272
|
-
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
273
|
-
|
274
|
-
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
275
|
-
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
276
|
-
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
277
|
-
|
278
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
279
|
-
|
280
|
-
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
281
|
-
|
282
|
-
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
283
|
-
|
284
|
-
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
285
|
-
|
286
267
|
## artifactregistry.RepositoryIamPolicy
|
287
268
|
|
288
269
|
```python
|
@@ -444,25 +425,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
444
425
|
member="user:jane@example.com")
|
445
426
|
```
|
446
427
|
|
447
|
-
## This resource supports User Project Overrides.
|
448
|
-
|
449
|
-
-
|
450
|
-
|
451
|
-
# IAM policy for Artifact Registry Repository
|
452
|
-
Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
|
453
|
-
|
454
|
-
* `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
455
|
-
* `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
456
|
-
* `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
457
|
-
|
458
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
459
|
-
|
460
|
-
* `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
461
|
-
|
462
|
-
> **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
|
463
|
-
|
464
|
-
> **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
465
|
-
|
466
428
|
## artifactregistry.RepositoryIamPolicy
|
467
429
|
|
468
430
|
```python
|
@@ -391,25 +391,6 @@ class ConnectionIamBinding(pulumi.CustomResource):
|
|
391
391
|
member="user:jane@example.com")
|
392
392
|
```
|
393
393
|
|
394
|
-
## This resource supports User Project Overrides.
|
395
|
-
|
396
|
-
-
|
397
|
-
|
398
|
-
# IAM policy for BigQuery Connection Connection
|
399
|
-
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
400
|
-
|
401
|
-
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
402
|
-
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
403
|
-
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
404
|
-
|
405
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
406
|
-
|
407
|
-
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
408
|
-
|
409
|
-
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
410
|
-
|
411
|
-
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
412
|
-
|
413
394
|
## bigquery.ConnectionIamPolicy
|
414
395
|
|
415
396
|
```python
|
@@ -589,25 +570,6 @@ class ConnectionIamBinding(pulumi.CustomResource):
|
|
589
570
|
member="user:jane@example.com")
|
590
571
|
```
|
591
572
|
|
592
|
-
## This resource supports User Project Overrides.
|
593
|
-
|
594
|
-
-
|
595
|
-
|
596
|
-
# IAM policy for BigQuery Connection Connection
|
597
|
-
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
598
|
-
|
599
|
-
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
600
|
-
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
601
|
-
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
602
|
-
|
603
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
604
|
-
|
605
|
-
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
606
|
-
|
607
|
-
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
608
|
-
|
609
|
-
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
610
|
-
|
611
573
|
## bigquery.ConnectionIamPolicy
|
612
574
|
|
613
575
|
```python
|
@@ -391,25 +391,6 @@ class ConnectionIamMember(pulumi.CustomResource):
|
|
391
391
|
member="user:jane@example.com")
|
392
392
|
```
|
393
393
|
|
394
|
-
## This resource supports User Project Overrides.
|
395
|
-
|
396
|
-
-
|
397
|
-
|
398
|
-
# IAM policy for BigQuery Connection Connection
|
399
|
-
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
400
|
-
|
401
|
-
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
402
|
-
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
403
|
-
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
404
|
-
|
405
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
406
|
-
|
407
|
-
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
408
|
-
|
409
|
-
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
410
|
-
|
411
|
-
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
412
|
-
|
413
394
|
## bigquery.ConnectionIamPolicy
|
414
395
|
|
415
396
|
```python
|
@@ -589,25 +570,6 @@ class ConnectionIamMember(pulumi.CustomResource):
|
|
589
570
|
member="user:jane@example.com")
|
590
571
|
```
|
591
572
|
|
592
|
-
## This resource supports User Project Overrides.
|
593
|
-
|
594
|
-
-
|
595
|
-
|
596
|
-
# IAM policy for BigQuery Connection Connection
|
597
|
-
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
598
|
-
|
599
|
-
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
600
|
-
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
601
|
-
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
602
|
-
|
603
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
604
|
-
|
605
|
-
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
606
|
-
|
607
|
-
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
608
|
-
|
609
|
-
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
610
|
-
|
611
573
|
## bigquery.ConnectionIamPolicy
|
612
574
|
|
613
575
|
```python
|
@@ -288,25 +288,6 @@ class ConnectionIamPolicy(pulumi.CustomResource):
|
|
288
288
|
member="user:jane@example.com")
|
289
289
|
```
|
290
290
|
|
291
|
-
## This resource supports User Project Overrides.
|
292
|
-
|
293
|
-
-
|
294
|
-
|
295
|
-
# IAM policy for BigQuery Connection Connection
|
296
|
-
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
297
|
-
|
298
|
-
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
299
|
-
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
300
|
-
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
301
|
-
|
302
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
303
|
-
|
304
|
-
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
305
|
-
|
306
|
-
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
307
|
-
|
308
|
-
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
309
|
-
|
310
291
|
## bigquery.ConnectionIamPolicy
|
311
292
|
|
312
293
|
```python
|
@@ -474,25 +455,6 @@ class ConnectionIamPolicy(pulumi.CustomResource):
|
|
474
455
|
member="user:jane@example.com")
|
475
456
|
```
|
476
457
|
|
477
|
-
## This resource supports User Project Overrides.
|
478
|
-
|
479
|
-
-
|
480
|
-
|
481
|
-
# IAM policy for BigQuery Connection Connection
|
482
|
-
Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
|
483
|
-
|
484
|
-
* `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
|
485
|
-
* `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
|
486
|
-
* `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
|
487
|
-
|
488
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
489
|
-
|
490
|
-
* `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
|
491
|
-
|
492
|
-
> **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
|
493
|
-
|
494
|
-
> **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
|
495
|
-
|
496
458
|
## bigquery.ConnectionIamPolicy
|
497
459
|
|
498
460
|
```python
|
@@ -315,6 +315,22 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
315
315
|
member="user:jane@example.com")
|
316
316
|
```
|
317
317
|
|
318
|
+
## bigquery.DatasetIamPolicy
|
319
|
+
|
320
|
+
```python
|
321
|
+
import pulumi
|
322
|
+
import pulumi_gcp as gcp
|
323
|
+
|
324
|
+
owner = gcp.organizations.get_iam_policy(bindings=[{
|
325
|
+
"role": "roles/bigquery.dataOwner",
|
326
|
+
"members": ["user:jane@example.com"],
|
327
|
+
}])
|
328
|
+
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
329
|
+
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
330
|
+
dataset_id=dataset_dataset.dataset_id,
|
331
|
+
policy_data=owner.policy_data)
|
332
|
+
```
|
333
|
+
|
318
334
|
## bigquery.DatasetIamBinding
|
319
335
|
|
320
336
|
```python
|
@@ -452,6 +468,22 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
452
468
|
member="user:jane@example.com")
|
453
469
|
```
|
454
470
|
|
471
|
+
## bigquery.DatasetIamPolicy
|
472
|
+
|
473
|
+
```python
|
474
|
+
import pulumi
|
475
|
+
import pulumi_gcp as gcp
|
476
|
+
|
477
|
+
owner = gcp.organizations.get_iam_policy(bindings=[{
|
478
|
+
"role": "roles/bigquery.dataOwner",
|
479
|
+
"members": ["user:jane@example.com"],
|
480
|
+
}])
|
481
|
+
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
482
|
+
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
483
|
+
dataset_id=dataset_dataset.dataset_id,
|
484
|
+
policy_data=owner.policy_data)
|
485
|
+
```
|
486
|
+
|
455
487
|
## bigquery.DatasetIamBinding
|
456
488
|
|
457
489
|
```python
|
@@ -315,6 +315,22 @@ class DatasetIamMember(pulumi.CustomResource):
|
|
315
315
|
member="user:jane@example.com")
|
316
316
|
```
|
317
317
|
|
318
|
+
## bigquery.DatasetIamPolicy
|
319
|
+
|
320
|
+
```python
|
321
|
+
import pulumi
|
322
|
+
import pulumi_gcp as gcp
|
323
|
+
|
324
|
+
owner = gcp.organizations.get_iam_policy(bindings=[{
|
325
|
+
"role": "roles/bigquery.dataOwner",
|
326
|
+
"members": ["user:jane@example.com"],
|
327
|
+
}])
|
328
|
+
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
329
|
+
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
330
|
+
dataset_id=dataset_dataset.dataset_id,
|
331
|
+
policy_data=owner.policy_data)
|
332
|
+
```
|
333
|
+
|
318
334
|
## bigquery.DatasetIamBinding
|
319
335
|
|
320
336
|
```python
|
@@ -452,6 +468,22 @@ class DatasetIamMember(pulumi.CustomResource):
|
|
452
468
|
member="user:jane@example.com")
|
453
469
|
```
|
454
470
|
|
471
|
+
## bigquery.DatasetIamPolicy
|
472
|
+
|
473
|
+
```python
|
474
|
+
import pulumi
|
475
|
+
import pulumi_gcp as gcp
|
476
|
+
|
477
|
+
owner = gcp.organizations.get_iam_policy(bindings=[{
|
478
|
+
"role": "roles/bigquery.dataOwner",
|
479
|
+
"members": ["user:jane@example.com"],
|
480
|
+
}])
|
481
|
+
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
482
|
+
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
483
|
+
dataset_id=dataset_dataset.dataset_id,
|
484
|
+
policy_data=owner.policy_data)
|
485
|
+
```
|
486
|
+
|
455
487
|
## bigquery.DatasetIamBinding
|
456
488
|
|
457
489
|
```python
|
@@ -220,6 +220,22 @@ class DatasetIamPolicy(pulumi.CustomResource):
|
|
220
220
|
member="user:jane@example.com")
|
221
221
|
```
|
222
222
|
|
223
|
+
## bigquery.DatasetIamPolicy
|
224
|
+
|
225
|
+
```python
|
226
|
+
import pulumi
|
227
|
+
import pulumi_gcp as gcp
|
228
|
+
|
229
|
+
owner = gcp.organizations.get_iam_policy(bindings=[{
|
230
|
+
"role": "roles/bigquery.dataOwner",
|
231
|
+
"members": ["user:jane@example.com"],
|
232
|
+
}])
|
233
|
+
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
234
|
+
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
235
|
+
dataset_id=dataset_dataset.dataset_id,
|
236
|
+
policy_data=owner.policy_data)
|
237
|
+
```
|
238
|
+
|
223
239
|
## bigquery.DatasetIamBinding
|
224
240
|
|
225
241
|
```python
|
@@ -347,6 +363,22 @@ class DatasetIamPolicy(pulumi.CustomResource):
|
|
347
363
|
member="user:jane@example.com")
|
348
364
|
```
|
349
365
|
|
366
|
+
## bigquery.DatasetIamPolicy
|
367
|
+
|
368
|
+
```python
|
369
|
+
import pulumi
|
370
|
+
import pulumi_gcp as gcp
|
371
|
+
|
372
|
+
owner = gcp.organizations.get_iam_policy(bindings=[{
|
373
|
+
"role": "roles/bigquery.dataOwner",
|
374
|
+
"members": ["user:jane@example.com"],
|
375
|
+
}])
|
376
|
+
dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
|
377
|
+
dataset = gcp.bigquery.DatasetIamPolicy("dataset",
|
378
|
+
dataset_id=dataset_dataset.dataset_id,
|
379
|
+
policy_data=owner.policy_data)
|
380
|
+
```
|
381
|
+
|
350
382
|
## bigquery.DatasetIamBinding
|
351
383
|
|
352
384
|
```python
|