pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -410,27 +410,6 @@ class IamBinding(pulumi.CustomResource):
|
|
410
410
|
})
|
411
411
|
```
|
412
412
|
|
413
|
-
## This resource supports User Project Overrides.
|
414
|
-
|
415
|
-
-
|
416
|
-
|
417
|
-
# IAM policy for BigQuery Table
|
418
|
-
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
419
|
-
|
420
|
-
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
421
|
-
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
422
|
-
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
423
|
-
|
424
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
425
|
-
|
426
|
-
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
427
|
-
|
428
|
-
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
429
|
-
|
430
|
-
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
431
|
-
|
432
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
433
|
-
|
434
413
|
## bigquery.IamPolicy
|
435
414
|
|
436
415
|
```python
|
@@ -719,27 +698,6 @@ class IamBinding(pulumi.CustomResource):
|
|
719
698
|
})
|
720
699
|
```
|
721
700
|
|
722
|
-
## This resource supports User Project Overrides.
|
723
|
-
|
724
|
-
-
|
725
|
-
|
726
|
-
# IAM policy for BigQuery Table
|
727
|
-
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
728
|
-
|
729
|
-
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
730
|
-
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
731
|
-
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
732
|
-
|
733
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
734
|
-
|
735
|
-
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
736
|
-
|
737
|
-
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
738
|
-
|
739
|
-
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
740
|
-
|
741
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
742
|
-
|
743
701
|
## bigquery.IamPolicy
|
744
702
|
|
745
703
|
```python
|
@@ -410,27 +410,6 @@ class IamMember(pulumi.CustomResource):
|
|
410
410
|
})
|
411
411
|
```
|
412
412
|
|
413
|
-
## This resource supports User Project Overrides.
|
414
|
-
|
415
|
-
-
|
416
|
-
|
417
|
-
# IAM policy for BigQuery Table
|
418
|
-
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
419
|
-
|
420
|
-
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
421
|
-
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
422
|
-
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
423
|
-
|
424
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
425
|
-
|
426
|
-
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
427
|
-
|
428
|
-
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
429
|
-
|
430
|
-
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
431
|
-
|
432
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
433
|
-
|
434
413
|
## bigquery.IamPolicy
|
435
414
|
|
436
415
|
```python
|
@@ -719,27 +698,6 @@ class IamMember(pulumi.CustomResource):
|
|
719
698
|
})
|
720
699
|
```
|
721
700
|
|
722
|
-
## This resource supports User Project Overrides.
|
723
|
-
|
724
|
-
-
|
725
|
-
|
726
|
-
# IAM policy for BigQuery Table
|
727
|
-
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
728
|
-
|
729
|
-
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
730
|
-
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
731
|
-
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
732
|
-
|
733
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
734
|
-
|
735
|
-
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
736
|
-
|
737
|
-
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
738
|
-
|
739
|
-
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
740
|
-
|
741
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
742
|
-
|
743
701
|
## bigquery.IamPolicy
|
744
702
|
|
745
703
|
```python
|
@@ -295,27 +295,6 @@ class IamPolicy(pulumi.CustomResource):
|
|
295
295
|
})
|
296
296
|
```
|
297
297
|
|
298
|
-
## This resource supports User Project Overrides.
|
299
|
-
|
300
|
-
-
|
301
|
-
|
302
|
-
# IAM policy for BigQuery Table
|
303
|
-
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
304
|
-
|
305
|
-
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
306
|
-
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
307
|
-
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
308
|
-
|
309
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
310
|
-
|
311
|
-
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
312
|
-
|
313
|
-
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
314
|
-
|
315
|
-
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
316
|
-
|
317
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
318
|
-
|
319
298
|
## bigquery.IamPolicy
|
320
299
|
|
321
300
|
```python
|
@@ -590,27 +569,6 @@ class IamPolicy(pulumi.CustomResource):
|
|
590
569
|
})
|
591
570
|
```
|
592
571
|
|
593
|
-
## This resource supports User Project Overrides.
|
594
|
-
|
595
|
-
-
|
596
|
-
|
597
|
-
# IAM policy for BigQuery Table
|
598
|
-
Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
|
599
|
-
|
600
|
-
* `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
|
601
|
-
* `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
|
602
|
-
* `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
|
603
|
-
|
604
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
605
|
-
|
606
|
-
* `bigquery.IamPolicy`: Retrieves the IAM policy for the table
|
607
|
-
|
608
|
-
> **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
|
609
|
-
|
610
|
-
> **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
|
611
|
-
|
612
|
-
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
613
|
-
|
614
572
|
## bigquery.IamPolicy
|
615
573
|
|
616
574
|
```python
|
@@ -367,25 +367,6 @@ class DataExchangeIamBinding(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
-
## This resource supports User Project Overrides.
|
371
|
-
|
372
|
-
-
|
373
|
-
|
374
|
-
# IAM policy for Bigquery Analytics Hub DataExchange
|
375
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
376
|
-
|
377
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
378
|
-
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
379
|
-
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
380
|
-
|
381
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
-
|
383
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
384
|
-
|
385
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
386
|
-
|
387
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
-
|
389
370
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
390
371
|
|
391
372
|
```python
|
@@ -559,25 +540,6 @@ class DataExchangeIamBinding(pulumi.CustomResource):
|
|
559
540
|
member="user:jane@example.com")
|
560
541
|
```
|
561
542
|
|
562
|
-
## This resource supports User Project Overrides.
|
563
|
-
|
564
|
-
-
|
565
|
-
|
566
|
-
# IAM policy for Bigquery Analytics Hub DataExchange
|
567
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
568
|
-
|
569
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
570
|
-
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
571
|
-
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
572
|
-
|
573
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
-
|
575
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
576
|
-
|
577
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
578
|
-
|
579
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
-
|
581
543
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
582
544
|
|
583
545
|
```python
|
@@ -367,25 +367,6 @@ class DataExchangeIamMember(pulumi.CustomResource):
|
|
367
367
|
member="user:jane@example.com")
|
368
368
|
```
|
369
369
|
|
370
|
-
## This resource supports User Project Overrides.
|
371
|
-
|
372
|
-
-
|
373
|
-
|
374
|
-
# IAM policy for Bigquery Analytics Hub DataExchange
|
375
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
376
|
-
|
377
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
378
|
-
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
379
|
-
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
380
|
-
|
381
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
382
|
-
|
383
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
384
|
-
|
385
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
386
|
-
|
387
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
388
|
-
|
389
370
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
390
371
|
|
391
372
|
```python
|
@@ -559,25 +540,6 @@ class DataExchangeIamMember(pulumi.CustomResource):
|
|
559
540
|
member="user:jane@example.com")
|
560
541
|
```
|
561
542
|
|
562
|
-
## This resource supports User Project Overrides.
|
563
|
-
|
564
|
-
-
|
565
|
-
|
566
|
-
# IAM policy for Bigquery Analytics Hub DataExchange
|
567
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
568
|
-
|
569
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
570
|
-
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
571
|
-
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
572
|
-
|
573
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
574
|
-
|
575
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
576
|
-
|
577
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
578
|
-
|
579
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
580
|
-
|
581
543
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
582
544
|
|
583
545
|
```python
|
@@ -264,25 +264,6 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
|
|
264
264
|
member="user:jane@example.com")
|
265
265
|
```
|
266
266
|
|
267
|
-
## This resource supports User Project Overrides.
|
268
|
-
|
269
|
-
-
|
270
|
-
|
271
|
-
# IAM policy for Bigquery Analytics Hub DataExchange
|
272
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
273
|
-
|
274
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
275
|
-
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
276
|
-
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
277
|
-
|
278
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
279
|
-
|
280
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
281
|
-
|
282
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
283
|
-
|
284
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
285
|
-
|
286
267
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
287
268
|
|
288
269
|
```python
|
@@ -444,25 +425,6 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
|
|
444
425
|
member="user:jane@example.com")
|
445
426
|
```
|
446
427
|
|
447
|
-
## This resource supports User Project Overrides.
|
448
|
-
|
449
|
-
-
|
450
|
-
|
451
|
-
# IAM policy for Bigquery Analytics Hub DataExchange
|
452
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
|
453
|
-
|
454
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
|
455
|
-
* `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
|
456
|
-
* `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
|
457
|
-
|
458
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
459
|
-
|
460
|
-
* `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
|
461
|
-
|
462
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
|
463
|
-
|
464
|
-
> **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
|
465
|
-
|
466
428
|
## bigqueryanalyticshub.DataExchangeIamPolicy
|
467
429
|
|
468
430
|
```python
|
@@ -402,25 +402,6 @@ class ListingIamBinding(pulumi.CustomResource):
|
|
402
402
|
member="user:jane@example.com")
|
403
403
|
```
|
404
404
|
|
405
|
-
## This resource supports User Project Overrides.
|
406
|
-
|
407
|
-
-
|
408
|
-
|
409
|
-
# IAM policy for Bigquery Analytics Hub Listing
|
410
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
411
|
-
|
412
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
413
|
-
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
414
|
-
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
415
|
-
|
416
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
-
|
418
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
419
|
-
|
420
|
-
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
421
|
-
|
422
|
-
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
-
|
424
405
|
## bigqueryanalyticshub.ListingIamPolicy
|
425
406
|
|
426
407
|
```python
|
@@ -601,25 +582,6 @@ class ListingIamBinding(pulumi.CustomResource):
|
|
601
582
|
member="user:jane@example.com")
|
602
583
|
```
|
603
584
|
|
604
|
-
## This resource supports User Project Overrides.
|
605
|
-
|
606
|
-
-
|
607
|
-
|
608
|
-
# IAM policy for Bigquery Analytics Hub Listing
|
609
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
610
|
-
|
611
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
612
|
-
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
613
|
-
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
614
|
-
|
615
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
616
|
-
|
617
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
618
|
-
|
619
|
-
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
620
|
-
|
621
|
-
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
622
|
-
|
623
585
|
## bigqueryanalyticshub.ListingIamPolicy
|
624
586
|
|
625
587
|
```python
|
@@ -402,25 +402,6 @@ class ListingIamMember(pulumi.CustomResource):
|
|
402
402
|
member="user:jane@example.com")
|
403
403
|
```
|
404
404
|
|
405
|
-
## This resource supports User Project Overrides.
|
406
|
-
|
407
|
-
-
|
408
|
-
|
409
|
-
# IAM policy for Bigquery Analytics Hub Listing
|
410
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
411
|
-
|
412
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
413
|
-
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
414
|
-
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
415
|
-
|
416
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
-
|
418
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
419
|
-
|
420
|
-
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
421
|
-
|
422
|
-
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
-
|
424
405
|
## bigqueryanalyticshub.ListingIamPolicy
|
425
406
|
|
426
407
|
```python
|
@@ -601,25 +582,6 @@ class ListingIamMember(pulumi.CustomResource):
|
|
601
582
|
member="user:jane@example.com")
|
602
583
|
```
|
603
584
|
|
604
|
-
## This resource supports User Project Overrides.
|
605
|
-
|
606
|
-
-
|
607
|
-
|
608
|
-
# IAM policy for Bigquery Analytics Hub Listing
|
609
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
610
|
-
|
611
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
612
|
-
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
613
|
-
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
614
|
-
|
615
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
616
|
-
|
617
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
618
|
-
|
619
|
-
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
620
|
-
|
621
|
-
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
622
|
-
|
623
585
|
## bigqueryanalyticshub.ListingIamPolicy
|
624
586
|
|
625
587
|
```python
|
@@ -299,25 +299,6 @@ class ListingIamPolicy(pulumi.CustomResource):
|
|
299
299
|
member="user:jane@example.com")
|
300
300
|
```
|
301
301
|
|
302
|
-
## This resource supports User Project Overrides.
|
303
|
-
|
304
|
-
-
|
305
|
-
|
306
|
-
# IAM policy for Bigquery Analytics Hub Listing
|
307
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
308
|
-
|
309
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
310
|
-
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
311
|
-
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
312
|
-
|
313
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
314
|
-
|
315
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
316
|
-
|
317
|
-
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
318
|
-
|
319
|
-
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
320
|
-
|
321
302
|
## bigqueryanalyticshub.ListingIamPolicy
|
322
303
|
|
323
304
|
```python
|
@@ -486,25 +467,6 @@ class ListingIamPolicy(pulumi.CustomResource):
|
|
486
467
|
member="user:jane@example.com")
|
487
468
|
```
|
488
469
|
|
489
|
-
## This resource supports User Project Overrides.
|
490
|
-
|
491
|
-
-
|
492
|
-
|
493
|
-
# IAM policy for Bigquery Analytics Hub Listing
|
494
|
-
Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
|
495
|
-
|
496
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
|
497
|
-
* `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
|
498
|
-
* `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
|
499
|
-
|
500
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
501
|
-
|
502
|
-
* `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
|
503
|
-
|
504
|
-
> **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
|
505
|
-
|
506
|
-
> **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
|
507
|
-
|
508
470
|
## bigqueryanalyticshub.ListingIamPolicy
|
509
471
|
|
510
472
|
```python
|
@@ -359,25 +359,6 @@ class DataPolicyIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
-
## This resource supports User Project Overrides.
|
363
|
-
|
364
|
-
-
|
365
|
-
|
366
|
-
# IAM policy for BigQuery Data Policy DataPolicy
|
367
|
-
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
368
|
-
|
369
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
370
|
-
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
371
|
-
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
372
|
-
|
373
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
-
|
375
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
376
|
-
|
377
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
378
|
-
|
379
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
-
|
381
362
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
382
363
|
|
383
364
|
```python
|
@@ -550,25 +531,6 @@ class DataPolicyIamBinding(pulumi.CustomResource):
|
|
550
531
|
member="user:jane@example.com")
|
551
532
|
```
|
552
533
|
|
553
|
-
## This resource supports User Project Overrides.
|
554
|
-
|
555
|
-
-
|
556
|
-
|
557
|
-
# IAM policy for BigQuery Data Policy DataPolicy
|
558
|
-
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
559
|
-
|
560
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
561
|
-
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
562
|
-
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
563
|
-
|
564
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
-
|
566
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
567
|
-
|
568
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
569
|
-
|
570
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
-
|
572
534
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
573
535
|
|
574
536
|
```python
|
@@ -359,25 +359,6 @@ class DataPolicyIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
-
## This resource supports User Project Overrides.
|
363
|
-
|
364
|
-
-
|
365
|
-
|
366
|
-
# IAM policy for BigQuery Data Policy DataPolicy
|
367
|
-
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
368
|
-
|
369
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
370
|
-
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
371
|
-
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
372
|
-
|
373
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
-
|
375
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
376
|
-
|
377
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
378
|
-
|
379
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
-
|
381
362
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
382
363
|
|
383
364
|
```python
|
@@ -550,25 +531,6 @@ class DataPolicyIamMember(pulumi.CustomResource):
|
|
550
531
|
member="user:jane@example.com")
|
551
532
|
```
|
552
533
|
|
553
|
-
## This resource supports User Project Overrides.
|
554
|
-
|
555
|
-
-
|
556
|
-
|
557
|
-
# IAM policy for BigQuery Data Policy DataPolicy
|
558
|
-
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
559
|
-
|
560
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
561
|
-
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
562
|
-
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
563
|
-
|
564
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
-
|
566
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
567
|
-
|
568
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
569
|
-
|
570
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
-
|
572
534
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
573
535
|
|
574
536
|
```python
|
@@ -256,25 +256,6 @@ class DataPolicyIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
-
## This resource supports User Project Overrides.
|
260
|
-
|
261
|
-
-
|
262
|
-
|
263
|
-
# IAM policy for BigQuery Data Policy DataPolicy
|
264
|
-
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
265
|
-
|
266
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
267
|
-
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
268
|
-
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
269
|
-
|
270
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
-
|
272
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
273
|
-
|
274
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
275
|
-
|
276
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
-
|
278
259
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
279
260
|
|
280
261
|
```python
|
@@ -435,25 +416,6 @@ class DataPolicyIamPolicy(pulumi.CustomResource):
|
|
435
416
|
member="user:jane@example.com")
|
436
417
|
```
|
437
418
|
|
438
|
-
## This resource supports User Project Overrides.
|
439
|
-
|
440
|
-
-
|
441
|
-
|
442
|
-
# IAM policy for BigQuery Data Policy DataPolicy
|
443
|
-
Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
|
444
|
-
|
445
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
|
446
|
-
* `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
|
447
|
-
* `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
|
448
|
-
|
449
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
-
|
451
|
-
* `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
|
452
|
-
|
453
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
|
454
|
-
|
455
|
-
> **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
-
|
457
419
|
## bigquerydatapolicy.DataPolicyIamPolicy
|
458
420
|
|
459
421
|
```python
|