pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-gcp might be problematic. Click here for more details.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
- pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
- pulumi_gcp/apigateway/api_iam_binding.py +0 -38
- pulumi_gcp/apigateway/api_iam_member.py +0 -38
- pulumi_gcp/apigateway/api_iam_policy.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
- pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
- pulumi_gcp/apigee/environment_iam_binding.py +0 -40
- pulumi_gcp/apigee/environment_iam_member.py +0 -40
- pulumi_gcp/apigee/environment_iam_policy.py +0 -40
- pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
- pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
- pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
- pulumi_gcp/bigquery/connection_iam_member.py +0 -38
- pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
- pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
- pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
- pulumi_gcp/bigquery/iam_binding.py +0 -42
- pulumi_gcp/bigquery/iam_member.py +0 -42
- pulumi_gcp/bigquery/iam_policy.py +0 -42
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
- pulumi_gcp/cloudrun/iam_binding.py +0 -38
- pulumi_gcp/cloudrun/iam_member.py +0 -38
- pulumi_gcp/cloudrun/iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
- pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
- pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
- pulumi_gcp/compute/disk_iam_binding.py +0 -38
- pulumi_gcp/compute/disk_iam_member.py +0 -38
- pulumi_gcp/compute/disk_iam_policy.py +0 -38
- pulumi_gcp/compute/image_iam_binding.py +0 -42
- pulumi_gcp/compute/image_iam_member.py +0 -42
- pulumi_gcp/compute/image_iam_policy.py +0 -42
- pulumi_gcp/compute/instance_iam_binding.py +0 -42
- pulumi_gcp/compute/instance_iam_member.py +0 -42
- pulumi_gcp/compute/instance_iam_policy.py +0 -42
- pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
- pulumi_gcp/compute/machine_image_iam_member.py +0 -40
- pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
- pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
- pulumi_gcp/compute/region_disk_iam_member.py +0 -38
- pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
- pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
- pulumi_gcp/compute/snapshot_iam_member.py +0 -38
- pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
- pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
- pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
- pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
- pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
- pulumi_gcp/dataplex/asset_iam_member.py +0 -38
- pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
- pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
- pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
- pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
- pulumi_gcp/dataplex/lake_iam_member.py +0 -38
- pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
- pulumi_gcp/dataplex/task_iam_binding.py +0 -38
- pulumi_gcp/dataplex/task_iam_member.py +0 -38
- pulumi_gcp/dataplex/task_iam_policy.py +0 -38
- pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
- pulumi_gcp/dataplex/zone_iam_member.py +0 -38
- pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
- pulumi_gcp/endpoints/service_iam_binding.py +0 -40
- pulumi_gcp/endpoints/service_iam_member.py +0 -40
- pulumi_gcp/endpoints/service_iam_policy.py +0 -40
- pulumi_gcp/folder/iam_audit_config.py +86 -0
- pulumi_gcp/folder/iam_member.py +86 -0
- pulumi_gcp/folder/iam_policy.py +86 -0
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
- pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
- pulumi_gcp/gkehub/feature_iam_member.py +0 -38
- pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
- pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
- pulumi_gcp/gkehub/membership_iam_member.py +0 -38
- pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
- pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
- pulumi_gcp/gkehub/scope_iam_member.py +0 -38
- pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
- pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
- pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
- pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
- pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
- pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
- pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_iam_binding.py +0 -42
- pulumi_gcp/iap/web_iam_member.py +0 -42
- pulumi_gcp/iap/web_iam_policy.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
- pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
- pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
- pulumi_gcp/kms/key_ring_iam_member.py +82 -0
- pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
- pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
- pulumi_gcp/notebooks/instance_iam_member.py +0 -38
- pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
- pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
- pulumi_gcp/organizations/iam_member.py +94 -0
- pulumi_gcp/organizations/iam_policy.py +94 -0
- pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
- pulumi_gcp/pubsub/schema_iam_member.py +0 -38
- pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
- pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
- pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
- pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
- pulumi_gcp/pubsub/topic_iam_member.py +0 -38
- pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
- pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
- pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
- pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
- pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
- pulumi_gcp/spanner/database_iam_binding.py +74 -0
- pulumi_gcp/spanner/database_iam_member.py +74 -0
- pulumi_gcp/spanner/database_iam_policy.py +74 -0
- pulumi_gcp/spanner/instance_iam_binding.py +30 -0
- pulumi_gcp/spanner/instance_iam_member.py +30 -0
- pulumi_gcp/spanner/instance_iam_policy.py +30 -0
- pulumi_gcp/storage/bucket_iam_binding.py +0 -42
- pulumi_gcp/storage/bucket_iam_member.py +0 -42
- pulumi_gcp/storage/bucket_iam_policy.py +0 -42
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
- pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_key_iam_member.py +0 -40
- pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
- pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
- pulumi_gcp/tags/tag_value_iam_member.py +0 -40
- pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -279,26 +279,6 @@ class PolicyTagIamMember(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
-
|
284
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
-
---
|
286
|
-
|
287
|
-
# IAM policy for Data catalog PolicyTag
|
288
|
-
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
289
|
-
|
290
|
-
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
291
|
-
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
292
|
-
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
293
|
-
|
294
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
-
|
296
|
-
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
297
|
-
|
298
|
-
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
299
|
-
|
300
|
-
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
-
|
302
282
|
## datacatalog.PolicyTagIamPolicy
|
303
283
|
|
304
284
|
```python
|
@@ -448,26 +428,6 @@ class PolicyTagIamMember(pulumi.CustomResource):
|
|
448
428
|
member="user:jane@example.com")
|
449
429
|
```
|
450
430
|
|
451
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
452
|
-
|
453
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
454
|
-
---
|
455
|
-
|
456
|
-
# IAM policy for Data catalog PolicyTag
|
457
|
-
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
458
|
-
|
459
|
-
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
460
|
-
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
461
|
-
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
462
|
-
|
463
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
-
|
465
|
-
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
466
|
-
|
467
|
-
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
468
|
-
|
469
|
-
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
-
|
471
431
|
## datacatalog.PolicyTagIamPolicy
|
472
432
|
|
473
433
|
```python
|
@@ -176,26 +176,6 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
|
|
176
176
|
member="user:jane@example.com")
|
177
177
|
```
|
178
178
|
|
179
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
180
|
-
|
181
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
182
|
-
---
|
183
|
-
|
184
|
-
# IAM policy for Data catalog PolicyTag
|
185
|
-
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
186
|
-
|
187
|
-
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
188
|
-
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
189
|
-
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
190
|
-
|
191
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
192
|
-
|
193
|
-
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
194
|
-
|
195
|
-
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
196
|
-
|
197
|
-
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
198
|
-
|
199
179
|
## datacatalog.PolicyTagIamPolicy
|
200
180
|
|
201
181
|
```python
|
@@ -333,26 +313,6 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
|
|
333
313
|
member="user:jane@example.com")
|
334
314
|
```
|
335
315
|
|
336
|
-
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
337
|
-
|
338
|
-
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
339
|
-
---
|
340
|
-
|
341
|
-
# IAM policy for Data catalog PolicyTag
|
342
|
-
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
343
|
-
|
344
|
-
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
345
|
-
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
346
|
-
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
347
|
-
|
348
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
349
|
-
|
350
|
-
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
351
|
-
|
352
|
-
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
353
|
-
|
354
|
-
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
355
|
-
|
356
316
|
## datacatalog.PolicyTagIamPolicy
|
357
317
|
|
358
318
|
```python
|
@@ -341,25 +341,6 @@ class TagTemplateIamBinding(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
-
## This resource supports User Project Overrides.
|
345
|
-
|
346
|
-
-
|
347
|
-
|
348
|
-
# IAM policy for Data catalog TagTemplate
|
349
|
-
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
350
|
-
|
351
|
-
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
352
|
-
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
353
|
-
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
354
|
-
|
355
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
-
|
357
|
-
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
358
|
-
|
359
|
-
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
360
|
-
|
361
|
-
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
-
|
363
344
|
## datacatalog.TagTemplateIamPolicy
|
364
345
|
|
365
346
|
```python
|
@@ -517,25 +498,6 @@ class TagTemplateIamBinding(pulumi.CustomResource):
|
|
517
498
|
member="user:jane@example.com")
|
518
499
|
```
|
519
500
|
|
520
|
-
## This resource supports User Project Overrides.
|
521
|
-
|
522
|
-
-
|
523
|
-
|
524
|
-
# IAM policy for Data catalog TagTemplate
|
525
|
-
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
526
|
-
|
527
|
-
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
528
|
-
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
529
|
-
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
530
|
-
|
531
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
-
|
533
|
-
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
534
|
-
|
535
|
-
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
536
|
-
|
537
|
-
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
-
|
539
501
|
## datacatalog.TagTemplateIamPolicy
|
540
502
|
|
541
503
|
```python
|
@@ -341,25 +341,6 @@ class TagTemplateIamMember(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
-
## This resource supports User Project Overrides.
|
345
|
-
|
346
|
-
-
|
347
|
-
|
348
|
-
# IAM policy for Data catalog TagTemplate
|
349
|
-
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
350
|
-
|
351
|
-
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
352
|
-
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
353
|
-
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
354
|
-
|
355
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
-
|
357
|
-
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
358
|
-
|
359
|
-
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
360
|
-
|
361
|
-
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
-
|
363
344
|
## datacatalog.TagTemplateIamPolicy
|
364
345
|
|
365
346
|
```python
|
@@ -517,25 +498,6 @@ class TagTemplateIamMember(pulumi.CustomResource):
|
|
517
498
|
member="user:jane@example.com")
|
518
499
|
```
|
519
500
|
|
520
|
-
## This resource supports User Project Overrides.
|
521
|
-
|
522
|
-
-
|
523
|
-
|
524
|
-
# IAM policy for Data catalog TagTemplate
|
525
|
-
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
526
|
-
|
527
|
-
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
528
|
-
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
529
|
-
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
530
|
-
|
531
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
-
|
533
|
-
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
534
|
-
|
535
|
-
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
536
|
-
|
537
|
-
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
-
|
539
501
|
## datacatalog.TagTemplateIamPolicy
|
540
502
|
|
541
503
|
```python
|
@@ -238,25 +238,6 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
|
|
238
238
|
member="user:jane@example.com")
|
239
239
|
```
|
240
240
|
|
241
|
-
## This resource supports User Project Overrides.
|
242
|
-
|
243
|
-
-
|
244
|
-
|
245
|
-
# IAM policy for Data catalog TagTemplate
|
246
|
-
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
247
|
-
|
248
|
-
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
249
|
-
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
250
|
-
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
251
|
-
|
252
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
253
|
-
|
254
|
-
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
255
|
-
|
256
|
-
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
257
|
-
|
258
|
-
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
259
|
-
|
260
241
|
## datacatalog.TagTemplateIamPolicy
|
261
242
|
|
262
243
|
```python
|
@@ -402,25 +383,6 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
|
|
402
383
|
member="user:jane@example.com")
|
403
384
|
```
|
404
385
|
|
405
|
-
## This resource supports User Project Overrides.
|
406
|
-
|
407
|
-
-
|
408
|
-
|
409
|
-
# IAM policy for Data catalog TagTemplate
|
410
|
-
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
411
|
-
|
412
|
-
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
413
|
-
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
414
|
-
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
415
|
-
|
416
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
-
|
418
|
-
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
419
|
-
|
420
|
-
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
421
|
-
|
422
|
-
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
-
|
424
386
|
## datacatalog.TagTemplateIamPolicy
|
425
387
|
|
426
388
|
```python
|
@@ -341,25 +341,6 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
-
## This resource supports User Project Overrides.
|
345
|
-
|
346
|
-
-
|
347
|
-
|
348
|
-
# IAM policy for Data catalog Taxonomy
|
349
|
-
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
350
|
-
|
351
|
-
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
352
|
-
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
353
|
-
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
354
|
-
|
355
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
-
|
357
|
-
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
358
|
-
|
359
|
-
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
360
|
-
|
361
|
-
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
-
|
363
344
|
## datacatalog.TaxonomyIamPolicy
|
364
345
|
|
365
346
|
```python
|
@@ -517,25 +498,6 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
517
498
|
member="user:jane@example.com")
|
518
499
|
```
|
519
500
|
|
520
|
-
## This resource supports User Project Overrides.
|
521
|
-
|
522
|
-
-
|
523
|
-
|
524
|
-
# IAM policy for Data catalog Taxonomy
|
525
|
-
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
526
|
-
|
527
|
-
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
528
|
-
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
529
|
-
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
530
|
-
|
531
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
-
|
533
|
-
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
534
|
-
|
535
|
-
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
536
|
-
|
537
|
-
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
-
|
539
501
|
## datacatalog.TaxonomyIamPolicy
|
540
502
|
|
541
503
|
```python
|
@@ -341,25 +341,6 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
-
## This resource supports User Project Overrides.
|
345
|
-
|
346
|
-
-
|
347
|
-
|
348
|
-
# IAM policy for Data catalog Taxonomy
|
349
|
-
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
350
|
-
|
351
|
-
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
352
|
-
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
353
|
-
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
354
|
-
|
355
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
-
|
357
|
-
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
358
|
-
|
359
|
-
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
360
|
-
|
361
|
-
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
-
|
363
344
|
## datacatalog.TaxonomyIamPolicy
|
364
345
|
|
365
346
|
```python
|
@@ -517,25 +498,6 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
517
498
|
member="user:jane@example.com")
|
518
499
|
```
|
519
500
|
|
520
|
-
## This resource supports User Project Overrides.
|
521
|
-
|
522
|
-
-
|
523
|
-
|
524
|
-
# IAM policy for Data catalog Taxonomy
|
525
|
-
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
526
|
-
|
527
|
-
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
528
|
-
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
529
|
-
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
530
|
-
|
531
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
-
|
533
|
-
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
534
|
-
|
535
|
-
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
536
|
-
|
537
|
-
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
-
|
539
501
|
## datacatalog.TaxonomyIamPolicy
|
540
502
|
|
541
503
|
```python
|
@@ -238,25 +238,6 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
238
238
|
member="user:jane@example.com")
|
239
239
|
```
|
240
240
|
|
241
|
-
## This resource supports User Project Overrides.
|
242
|
-
|
243
|
-
-
|
244
|
-
|
245
|
-
# IAM policy for Data catalog Taxonomy
|
246
|
-
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
247
|
-
|
248
|
-
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
249
|
-
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
250
|
-
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
251
|
-
|
252
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
253
|
-
|
254
|
-
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
255
|
-
|
256
|
-
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
257
|
-
|
258
|
-
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
259
|
-
|
260
241
|
## datacatalog.TaxonomyIamPolicy
|
261
242
|
|
262
243
|
```python
|
@@ -402,25 +383,6 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
402
383
|
member="user:jane@example.com")
|
403
384
|
```
|
404
385
|
|
405
|
-
## This resource supports User Project Overrides.
|
406
|
-
|
407
|
-
-
|
408
|
-
|
409
|
-
# IAM policy for Data catalog Taxonomy
|
410
|
-
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
411
|
-
|
412
|
-
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
413
|
-
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
414
|
-
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
415
|
-
|
416
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
-
|
418
|
-
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
419
|
-
|
420
|
-
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
421
|
-
|
422
|
-
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
-
|
424
386
|
## datacatalog.TaxonomyIamPolicy
|
425
387
|
|
426
388
|
```python
|
@@ -359,25 +359,6 @@ class AspectTypeIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
-
## This resource supports User Project Overrides.
|
363
|
-
|
364
|
-
-
|
365
|
-
|
366
|
-
# IAM policy for Dataplex AspectType
|
367
|
-
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
368
|
-
|
369
|
-
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
370
|
-
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
371
|
-
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
372
|
-
|
373
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
-
|
375
|
-
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
376
|
-
|
377
|
-
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
378
|
-
|
379
|
-
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
-
|
381
362
|
## dataplex.AspectTypeIamPolicy
|
382
363
|
|
383
364
|
```python
|
@@ -550,25 +531,6 @@ class AspectTypeIamBinding(pulumi.CustomResource):
|
|
550
531
|
member="user:jane@example.com")
|
551
532
|
```
|
552
533
|
|
553
|
-
## This resource supports User Project Overrides.
|
554
|
-
|
555
|
-
-
|
556
|
-
|
557
|
-
# IAM policy for Dataplex AspectType
|
558
|
-
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
559
|
-
|
560
|
-
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
561
|
-
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
562
|
-
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
563
|
-
|
564
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
-
|
566
|
-
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
567
|
-
|
568
|
-
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
569
|
-
|
570
|
-
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
-
|
572
534
|
## dataplex.AspectTypeIamPolicy
|
573
535
|
|
574
536
|
```python
|
@@ -359,25 +359,6 @@ class AspectTypeIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
-
## This resource supports User Project Overrides.
|
363
|
-
|
364
|
-
-
|
365
|
-
|
366
|
-
# IAM policy for Dataplex AspectType
|
367
|
-
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
368
|
-
|
369
|
-
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
370
|
-
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
371
|
-
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
372
|
-
|
373
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
-
|
375
|
-
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
376
|
-
|
377
|
-
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
378
|
-
|
379
|
-
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
-
|
381
362
|
## dataplex.AspectTypeIamPolicy
|
382
363
|
|
383
364
|
```python
|
@@ -550,25 +531,6 @@ class AspectTypeIamMember(pulumi.CustomResource):
|
|
550
531
|
member="user:jane@example.com")
|
551
532
|
```
|
552
533
|
|
553
|
-
## This resource supports User Project Overrides.
|
554
|
-
|
555
|
-
-
|
556
|
-
|
557
|
-
# IAM policy for Dataplex AspectType
|
558
|
-
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
559
|
-
|
560
|
-
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
561
|
-
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
562
|
-
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
563
|
-
|
564
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
-
|
566
|
-
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
567
|
-
|
568
|
-
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
569
|
-
|
570
|
-
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
-
|
572
534
|
## dataplex.AspectTypeIamPolicy
|
573
535
|
|
574
536
|
```python
|
@@ -256,25 +256,6 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
-
## This resource supports User Project Overrides.
|
260
|
-
|
261
|
-
-
|
262
|
-
|
263
|
-
# IAM policy for Dataplex AspectType
|
264
|
-
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
265
|
-
|
266
|
-
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
267
|
-
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
268
|
-
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
269
|
-
|
270
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
-
|
272
|
-
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
273
|
-
|
274
|
-
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
275
|
-
|
276
|
-
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
-
|
278
259
|
## dataplex.AspectTypeIamPolicy
|
279
260
|
|
280
261
|
```python
|
@@ -435,25 +416,6 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
|
|
435
416
|
member="user:jane@example.com")
|
436
417
|
```
|
437
418
|
|
438
|
-
## This resource supports User Project Overrides.
|
439
|
-
|
440
|
-
-
|
441
|
-
|
442
|
-
# IAM policy for Dataplex AspectType
|
443
|
-
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
444
|
-
|
445
|
-
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
446
|
-
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
447
|
-
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
448
|
-
|
449
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
-
|
451
|
-
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
452
|
-
|
453
|
-
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
454
|
-
|
455
|
-
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
-
|
457
419
|
## dataplex.AspectTypeIamPolicy
|
458
420
|
|
459
421
|
```python
|
@@ -401,25 +401,6 @@ class AssetIamBinding(pulumi.CustomResource):
|
|
401
401
|
member="user:jane@example.com")
|
402
402
|
```
|
403
403
|
|
404
|
-
## This resource supports User Project Overrides.
|
405
|
-
|
406
|
-
-
|
407
|
-
|
408
|
-
# IAM policy for Dataplex Asset
|
409
|
-
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
410
|
-
|
411
|
-
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
412
|
-
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
413
|
-
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
414
|
-
|
415
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
416
|
-
|
417
|
-
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
418
|
-
|
419
|
-
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
420
|
-
|
421
|
-
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
422
|
-
|
423
404
|
## dataplex.AssetIamPolicy
|
424
405
|
|
425
406
|
```python
|
@@ -601,25 +582,6 @@ class AssetIamBinding(pulumi.CustomResource):
|
|
601
582
|
member="user:jane@example.com")
|
602
583
|
```
|
603
584
|
|
604
|
-
## This resource supports User Project Overrides.
|
605
|
-
|
606
|
-
-
|
607
|
-
|
608
|
-
# IAM policy for Dataplex Asset
|
609
|
-
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
610
|
-
|
611
|
-
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
612
|
-
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
613
|
-
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
614
|
-
|
615
|
-
A data source can be used to retrieve policy data in advent you do not need creation
|
616
|
-
|
617
|
-
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
618
|
-
|
619
|
-
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
620
|
-
|
621
|
-
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
622
|
-
|
623
585
|
## dataplex.AssetIamPolicy
|
624
586
|
|
625
587
|
```python
|