pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -401,6 +401,25 @@ class AssetIamMember(pulumi.CustomResource):
|
|
401
401
|
member="user:jane@example.com")
|
402
402
|
```
|
403
403
|
|
404
|
+
## This resource supports User Project Overrides.
|
405
|
+
|
406
|
+
-
|
407
|
+
|
408
|
+
# IAM policy for Dataplex Asset
|
409
|
+
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
410
|
+
|
411
|
+
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
412
|
+
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
413
|
+
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
414
|
+
|
415
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
416
|
+
|
417
|
+
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
418
|
+
|
419
|
+
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
420
|
+
|
421
|
+
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
422
|
+
|
404
423
|
## dataplex.AssetIamPolicy
|
405
424
|
|
406
425
|
```python
|
@@ -582,6 +601,25 @@ class AssetIamMember(pulumi.CustomResource):
|
|
582
601
|
member="user:jane@example.com")
|
583
602
|
```
|
584
603
|
|
604
|
+
## This resource supports User Project Overrides.
|
605
|
+
|
606
|
+
-
|
607
|
+
|
608
|
+
# IAM policy for Dataplex Asset
|
609
|
+
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
610
|
+
|
611
|
+
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
612
|
+
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
613
|
+
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
614
|
+
|
615
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
616
|
+
|
617
|
+
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
618
|
+
|
619
|
+
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
620
|
+
|
621
|
+
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
622
|
+
|
585
623
|
## dataplex.AssetIamPolicy
|
586
624
|
|
587
625
|
```python
|
@@ -298,6 +298,25 @@ class AssetIamPolicy(pulumi.CustomResource):
|
|
298
298
|
member="user:jane@example.com")
|
299
299
|
```
|
300
300
|
|
301
|
+
## This resource supports User Project Overrides.
|
302
|
+
|
303
|
+
-
|
304
|
+
|
305
|
+
# IAM policy for Dataplex Asset
|
306
|
+
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
307
|
+
|
308
|
+
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
309
|
+
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
310
|
+
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
311
|
+
|
312
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
313
|
+
|
314
|
+
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
315
|
+
|
316
|
+
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
317
|
+
|
318
|
+
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
319
|
+
|
301
320
|
## dataplex.AssetIamPolicy
|
302
321
|
|
303
322
|
```python
|
@@ -467,6 +486,25 @@ class AssetIamPolicy(pulumi.CustomResource):
|
|
467
486
|
member="user:jane@example.com")
|
468
487
|
```
|
469
488
|
|
489
|
+
## This resource supports User Project Overrides.
|
490
|
+
|
491
|
+
-
|
492
|
+
|
493
|
+
# IAM policy for Dataplex Asset
|
494
|
+
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
495
|
+
|
496
|
+
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
497
|
+
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
498
|
+
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
499
|
+
|
500
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
501
|
+
|
502
|
+
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
503
|
+
|
504
|
+
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
505
|
+
|
506
|
+
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
507
|
+
|
470
508
|
## dataplex.AssetIamPolicy
|
471
509
|
|
472
510
|
```python
|
@@ -359,6 +359,25 @@ class DatascanIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex Datascan
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
|
370
|
+
* `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
|
371
|
+
* `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
|
376
|
+
|
377
|
+
> **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.DatascanIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class DatascanIamBinding(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex Datascan
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
|
561
|
+
* `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
|
562
|
+
* `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
|
567
|
+
|
568
|
+
> **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.DatascanIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -359,6 +359,25 @@ class DatascanIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex Datascan
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
|
370
|
+
* `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
|
371
|
+
* `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
|
376
|
+
|
377
|
+
> **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.DatascanIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class DatascanIamMember(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex Datascan
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
|
561
|
+
* `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
|
562
|
+
* `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
|
567
|
+
|
568
|
+
> **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.DatascanIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -256,6 +256,25 @@ class DatascanIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for Dataplex Datascan
|
264
|
+
Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
|
267
|
+
* `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
|
268
|
+
* `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
|
273
|
+
|
274
|
+
> **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## dataplex.DatascanIamPolicy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class DatascanIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for Dataplex Datascan
|
443
|
+
Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
|
446
|
+
* `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
|
447
|
+
* `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
|
452
|
+
|
453
|
+
> **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## dataplex.DatascanIamPolicy
|
420
458
|
|
421
459
|
```python
|
@@ -359,6 +359,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex EntryGroup
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
370
|
+
* `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
371
|
+
* `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
376
|
+
|
377
|
+
> **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.EntryGroupIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex EntryGroup
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
561
|
+
* `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
562
|
+
* `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
567
|
+
|
568
|
+
> **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.EntryGroupIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -359,6 +359,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex EntryGroup
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
370
|
+
* `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
371
|
+
* `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
376
|
+
|
377
|
+
> **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.EntryGroupIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex EntryGroup
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
561
|
+
* `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
562
|
+
* `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
567
|
+
|
568
|
+
> **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.EntryGroupIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -256,6 +256,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for Dataplex EntryGroup
|
264
|
+
Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
267
|
+
* `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
268
|
+
* `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
273
|
+
|
274
|
+
> **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## dataplex.EntryGroupIamPolicy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for Dataplex EntryGroup
|
443
|
+
Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
446
|
+
* `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
447
|
+
* `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
452
|
+
|
453
|
+
> **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## dataplex.EntryGroupIamPolicy
|
420
458
|
|
421
459
|
```python
|
@@ -359,6 +359,25 @@ class EntryTypeIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex EntryType
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
|
370
|
+
* `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
|
371
|
+
* `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
|
376
|
+
|
377
|
+
> **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.EntryTypeIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class EntryTypeIamBinding(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex EntryType
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
|
561
|
+
* `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
|
562
|
+
* `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
|
567
|
+
|
568
|
+
> **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.EntryTypeIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -359,6 +359,25 @@ class EntryTypeIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex EntryType
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
|
370
|
+
* `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
|
371
|
+
* `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
|
376
|
+
|
377
|
+
> **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.EntryTypeIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class EntryTypeIamMember(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex EntryType
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
|
561
|
+
* `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
|
562
|
+
* `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
|
567
|
+
|
568
|
+
> **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.EntryTypeIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -256,6 +256,25 @@ class EntryTypeIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for Dataplex EntryType
|
264
|
+
Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
|
267
|
+
* `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
|
268
|
+
* `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
|
273
|
+
|
274
|
+
> **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## dataplex.EntryTypeIamPolicy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class EntryTypeIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for Dataplex EntryType
|
443
|
+
Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
|
446
|
+
* `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
|
447
|
+
* `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
|
452
|
+
|
453
|
+
> **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## dataplex.EntryTypeIamPolicy
|
420
458
|
|
421
459
|
```python
|
@@ -347,6 +347,25 @@ class LakeIamBinding(pulumi.CustomResource):
|
|
347
347
|
member="user:jane@example.com")
|
348
348
|
```
|
349
349
|
|
350
|
+
## This resource supports User Project Overrides.
|
351
|
+
|
352
|
+
-
|
353
|
+
|
354
|
+
# IAM policy for Dataplex Lake
|
355
|
+
Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
|
356
|
+
|
357
|
+
* `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
|
358
|
+
* `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
|
359
|
+
* `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
|
360
|
+
|
361
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
362
|
+
|
363
|
+
* `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
|
364
|
+
|
365
|
+
> **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
|
366
|
+
|
367
|
+
> **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
|
368
|
+
|
350
369
|
## dataplex.LakeIamPolicy
|
351
370
|
|
352
371
|
```python
|
@@ -516,6 +535,25 @@ class LakeIamBinding(pulumi.CustomResource):
|
|
516
535
|
member="user:jane@example.com")
|
517
536
|
```
|
518
537
|
|
538
|
+
## This resource supports User Project Overrides.
|
539
|
+
|
540
|
+
-
|
541
|
+
|
542
|
+
# IAM policy for Dataplex Lake
|
543
|
+
Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
|
544
|
+
|
545
|
+
* `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
|
546
|
+
* `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
|
547
|
+
* `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
|
548
|
+
|
549
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
550
|
+
|
551
|
+
* `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
|
552
|
+
|
553
|
+
> **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
|
554
|
+
|
555
|
+
> **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
|
556
|
+
|
519
557
|
## dataplex.LakeIamPolicy
|
520
558
|
|
521
559
|
```python
|