pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -364,6 +364,25 @@ class FeatureIamMember(pulumi.CustomResource):
|
|
364
364
|
member="user:jane@example.com")
|
365
365
|
```
|
366
366
|
|
367
|
+
## This resource supports User Project Overrides.
|
368
|
+
|
369
|
+
-
|
370
|
+
|
371
|
+
# IAM policy for GKEHub Feature
|
372
|
+
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
373
|
+
|
374
|
+
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
375
|
+
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
376
|
+
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
377
|
+
|
378
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
379
|
+
|
380
|
+
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
381
|
+
|
382
|
+
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
383
|
+
|
384
|
+
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
385
|
+
|
367
386
|
## gkehub.FeatureIamPolicy
|
368
387
|
|
369
388
|
```python
|
@@ -536,6 +555,25 @@ class FeatureIamMember(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for GKEHub Feature
|
563
|
+
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
566
|
+
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
567
|
+
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
572
|
+
|
573
|
+
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## gkehub.FeatureIamPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -261,6 +261,25 @@ class FeatureIamPolicy(pulumi.CustomResource):
|
|
261
261
|
member="user:jane@example.com")
|
262
262
|
```
|
263
263
|
|
264
|
+
## This resource supports User Project Overrides.
|
265
|
+
|
266
|
+
-
|
267
|
+
|
268
|
+
# IAM policy for GKEHub Feature
|
269
|
+
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
270
|
+
|
271
|
+
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
272
|
+
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
273
|
+
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
274
|
+
|
275
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
276
|
+
|
277
|
+
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
278
|
+
|
279
|
+
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
280
|
+
|
281
|
+
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
282
|
+
|
264
283
|
## gkehub.FeatureIamPolicy
|
265
284
|
|
266
285
|
```python
|
@@ -421,6 +440,25 @@ class FeatureIamPolicy(pulumi.CustomResource):
|
|
421
440
|
member="user:jane@example.com")
|
422
441
|
```
|
423
442
|
|
443
|
+
## This resource supports User Project Overrides.
|
444
|
+
|
445
|
+
-
|
446
|
+
|
447
|
+
# IAM policy for GKEHub Feature
|
448
|
+
Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
|
449
|
+
|
450
|
+
* `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
|
451
|
+
* `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
|
452
|
+
* `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
|
453
|
+
|
454
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
+
|
456
|
+
* `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
|
457
|
+
|
458
|
+
> **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
|
459
|
+
|
460
|
+
> **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
+
|
424
462
|
## gkehub.FeatureIamPolicy
|
425
463
|
|
426
464
|
```python
|
@@ -363,6 +363,25 @@ class MembershipIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for GKEHub Membership
|
371
|
+
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
374
|
+
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
375
|
+
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
380
|
+
|
381
|
+
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## gkehub.MembershipIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -536,6 +555,25 @@ class MembershipIamBinding(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for GKEHub Membership
|
563
|
+
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
566
|
+
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
567
|
+
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
572
|
+
|
573
|
+
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## gkehub.MembershipIamPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -363,6 +363,25 @@ class MembershipIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for GKEHub Membership
|
371
|
+
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
374
|
+
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
375
|
+
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
380
|
+
|
381
|
+
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## gkehub.MembershipIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -536,6 +555,25 @@ class MembershipIamMember(pulumi.CustomResource):
|
|
536
555
|
member="user:jane@example.com")
|
537
556
|
```
|
538
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for GKEHub Membership
|
563
|
+
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
566
|
+
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
567
|
+
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
572
|
+
|
573
|
+
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
539
577
|
## gkehub.MembershipIamPolicy
|
540
578
|
|
541
579
|
```python
|
@@ -260,6 +260,25 @@ class MembershipIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
+
## This resource supports User Project Overrides.
|
264
|
+
|
265
|
+
-
|
266
|
+
|
267
|
+
# IAM policy for GKEHub Membership
|
268
|
+
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
271
|
+
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
272
|
+
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
277
|
+
|
278
|
+
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
263
282
|
## gkehub.MembershipIamPolicy
|
264
283
|
|
265
284
|
```python
|
@@ -421,6 +440,25 @@ class MembershipIamPolicy(pulumi.CustomResource):
|
|
421
440
|
member="user:jane@example.com")
|
422
441
|
```
|
423
442
|
|
443
|
+
## This resource supports User Project Overrides.
|
444
|
+
|
445
|
+
-
|
446
|
+
|
447
|
+
# IAM policy for GKEHub Membership
|
448
|
+
Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
|
449
|
+
|
450
|
+
* `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
|
451
|
+
* `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
|
452
|
+
* `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
|
453
|
+
|
454
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
+
|
456
|
+
* `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
|
457
|
+
|
458
|
+
> **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
|
459
|
+
|
460
|
+
> **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
+
|
424
462
|
## gkehub.MembershipIamPolicy
|
425
463
|
|
426
464
|
```python
|
@@ -311,6 +311,25 @@ class ScopeIamBinding(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
+
## This resource supports User Project Overrides.
|
315
|
+
|
316
|
+
-
|
317
|
+
|
318
|
+
# IAM policy for GKEHub Scope
|
319
|
+
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
320
|
+
|
321
|
+
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
322
|
+
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
323
|
+
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
324
|
+
|
325
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
+
|
327
|
+
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
328
|
+
|
329
|
+
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
330
|
+
|
331
|
+
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
+
|
314
333
|
## gkehub.ScopeIamPolicy
|
315
334
|
|
316
335
|
```python
|
@@ -471,6 +490,25 @@ class ScopeIamBinding(pulumi.CustomResource):
|
|
471
490
|
member="user:jane@example.com")
|
472
491
|
```
|
473
492
|
|
493
|
+
## This resource supports User Project Overrides.
|
494
|
+
|
495
|
+
-
|
496
|
+
|
497
|
+
# IAM policy for GKEHub Scope
|
498
|
+
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
499
|
+
|
500
|
+
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
501
|
+
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
502
|
+
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
503
|
+
|
504
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
+
|
506
|
+
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
507
|
+
|
508
|
+
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
509
|
+
|
510
|
+
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
+
|
474
512
|
## gkehub.ScopeIamPolicy
|
475
513
|
|
476
514
|
```python
|
@@ -311,6 +311,25 @@ class ScopeIamMember(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
+
## This resource supports User Project Overrides.
|
315
|
+
|
316
|
+
-
|
317
|
+
|
318
|
+
# IAM policy for GKEHub Scope
|
319
|
+
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
320
|
+
|
321
|
+
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
322
|
+
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
323
|
+
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
324
|
+
|
325
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
+
|
327
|
+
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
328
|
+
|
329
|
+
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
330
|
+
|
331
|
+
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
+
|
314
333
|
## gkehub.ScopeIamPolicy
|
315
334
|
|
316
335
|
```python
|
@@ -471,6 +490,25 @@ class ScopeIamMember(pulumi.CustomResource):
|
|
471
490
|
member="user:jane@example.com")
|
472
491
|
```
|
473
492
|
|
493
|
+
## This resource supports User Project Overrides.
|
494
|
+
|
495
|
+
-
|
496
|
+
|
497
|
+
# IAM policy for GKEHub Scope
|
498
|
+
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
499
|
+
|
500
|
+
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
501
|
+
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
502
|
+
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
503
|
+
|
504
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
+
|
506
|
+
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
507
|
+
|
508
|
+
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
509
|
+
|
510
|
+
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
+
|
474
512
|
## gkehub.ScopeIamPolicy
|
475
513
|
|
476
514
|
```python
|
@@ -208,6 +208,25 @@ class ScopeIamPolicy(pulumi.CustomResource):
|
|
208
208
|
member="user:jane@example.com")
|
209
209
|
```
|
210
210
|
|
211
|
+
## This resource supports User Project Overrides.
|
212
|
+
|
213
|
+
-
|
214
|
+
|
215
|
+
# IAM policy for GKEHub Scope
|
216
|
+
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
217
|
+
|
218
|
+
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
219
|
+
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
220
|
+
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
221
|
+
|
222
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
223
|
+
|
224
|
+
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
225
|
+
|
226
|
+
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
227
|
+
|
228
|
+
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
229
|
+
|
211
230
|
## gkehub.ScopeIamPolicy
|
212
231
|
|
213
232
|
```python
|
@@ -356,6 +375,25 @@ class ScopeIamPolicy(pulumi.CustomResource):
|
|
356
375
|
member="user:jane@example.com")
|
357
376
|
```
|
358
377
|
|
378
|
+
## This resource supports User Project Overrides.
|
379
|
+
|
380
|
+
-
|
381
|
+
|
382
|
+
# IAM policy for GKEHub Scope
|
383
|
+
Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
|
384
|
+
|
385
|
+
* `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
|
386
|
+
* `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
|
387
|
+
* `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
|
388
|
+
|
389
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
390
|
+
|
391
|
+
* `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
|
392
|
+
|
393
|
+
> **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
|
394
|
+
|
395
|
+
> **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
|
396
|
+
|
359
397
|
## gkehub.ScopeIamPolicy
|
360
398
|
|
361
399
|
```python
|
@@ -322,6 +322,26 @@ class ConsentStoreIamBinding(pulumi.CustomResource):
|
|
322
322
|
member="user:jane@example.com")
|
323
323
|
```
|
324
324
|
|
325
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
326
|
+
|
327
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
328
|
+
---
|
329
|
+
|
330
|
+
# IAM policy for Cloud Healthcare ConsentStore
|
331
|
+
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
332
|
+
|
333
|
+
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
334
|
+
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
335
|
+
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
336
|
+
|
337
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
338
|
+
|
339
|
+
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
340
|
+
|
341
|
+
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
342
|
+
|
343
|
+
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
344
|
+
|
325
345
|
## healthcare.ConsentStoreIamPolicy
|
326
346
|
|
327
347
|
```python
|
@@ -482,6 +502,26 @@ class ConsentStoreIamBinding(pulumi.CustomResource):
|
|
482
502
|
member="user:jane@example.com")
|
483
503
|
```
|
484
504
|
|
505
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
506
|
+
|
507
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
508
|
+
---
|
509
|
+
|
510
|
+
# IAM policy for Cloud Healthcare ConsentStore
|
511
|
+
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
512
|
+
|
513
|
+
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
514
|
+
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
515
|
+
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
516
|
+
|
517
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
518
|
+
|
519
|
+
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
520
|
+
|
521
|
+
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
522
|
+
|
523
|
+
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
524
|
+
|
485
525
|
## healthcare.ConsentStoreIamPolicy
|
486
526
|
|
487
527
|
```python
|
@@ -322,6 +322,26 @@ class ConsentStoreIamMember(pulumi.CustomResource):
|
|
322
322
|
member="user:jane@example.com")
|
323
323
|
```
|
324
324
|
|
325
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
326
|
+
|
327
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
328
|
+
---
|
329
|
+
|
330
|
+
# IAM policy for Cloud Healthcare ConsentStore
|
331
|
+
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
332
|
+
|
333
|
+
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
334
|
+
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
335
|
+
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
336
|
+
|
337
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
338
|
+
|
339
|
+
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
340
|
+
|
341
|
+
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
342
|
+
|
343
|
+
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
344
|
+
|
325
345
|
## healthcare.ConsentStoreIamPolicy
|
326
346
|
|
327
347
|
```python
|
@@ -482,6 +502,26 @@ class ConsentStoreIamMember(pulumi.CustomResource):
|
|
482
502
|
member="user:jane@example.com")
|
483
503
|
```
|
484
504
|
|
505
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
506
|
+
|
507
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
508
|
+
---
|
509
|
+
|
510
|
+
# IAM policy for Cloud Healthcare ConsentStore
|
511
|
+
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
512
|
+
|
513
|
+
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
514
|
+
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
515
|
+
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
516
|
+
|
517
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
518
|
+
|
519
|
+
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
520
|
+
|
521
|
+
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
522
|
+
|
523
|
+
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
524
|
+
|
485
525
|
## healthcare.ConsentStoreIamPolicy
|
486
526
|
|
487
527
|
```python
|
@@ -219,6 +219,26 @@ class ConsentStoreIamPolicy(pulumi.CustomResource):
|
|
219
219
|
member="user:jane@example.com")
|
220
220
|
```
|
221
221
|
|
222
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
223
|
+
|
224
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
225
|
+
---
|
226
|
+
|
227
|
+
# IAM policy for Cloud Healthcare ConsentStore
|
228
|
+
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
229
|
+
|
230
|
+
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
231
|
+
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
232
|
+
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
233
|
+
|
234
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
235
|
+
|
236
|
+
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
237
|
+
|
238
|
+
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
239
|
+
|
240
|
+
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
241
|
+
|
222
242
|
## healthcare.ConsentStoreIamPolicy
|
223
243
|
|
224
244
|
```python
|
@@ -367,6 +387,26 @@ class ConsentStoreIamPolicy(pulumi.CustomResource):
|
|
367
387
|
member="user:jane@example.com")
|
368
388
|
```
|
369
389
|
|
390
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
391
|
+
|
392
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
393
|
+
---
|
394
|
+
|
395
|
+
# IAM policy for Cloud Healthcare ConsentStore
|
396
|
+
Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
|
397
|
+
|
398
|
+
* `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
|
399
|
+
* `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
|
400
|
+
* `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
|
401
|
+
|
402
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
+
|
404
|
+
* `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
|
405
|
+
|
406
|
+
> **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
|
407
|
+
|
408
|
+
> **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
+
|
370
410
|
## healthcare.ConsentStoreIamPolicy
|
371
411
|
|
372
412
|
```python
|
@@ -275,21 +275,6 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
275
275
|
member="user:jane@example.com")
|
276
276
|
```
|
277
277
|
|
278
|
-
## healthcare.DatasetIamPolicy
|
279
|
-
|
280
|
-
```python
|
281
|
-
import pulumi
|
282
|
-
import pulumi_gcp as gcp
|
283
|
-
|
284
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
285
|
-
"role": "roles/editor",
|
286
|
-
"members": ["user:jane@example.com"],
|
287
|
-
}])
|
288
|
-
dataset = gcp.healthcare.DatasetIamPolicy("dataset",
|
289
|
-
dataset_id="your-dataset-id",
|
290
|
-
policy_data=admin.policy_data)
|
291
|
-
```
|
292
|
-
|
293
278
|
## healthcare.DatasetIamBinding
|
294
279
|
|
295
280
|
```python
|
@@ -414,21 +399,6 @@ class DatasetIamBinding(pulumi.CustomResource):
|
|
414
399
|
member="user:jane@example.com")
|
415
400
|
```
|
416
401
|
|
417
|
-
## healthcare.DatasetIamPolicy
|
418
|
-
|
419
|
-
```python
|
420
|
-
import pulumi
|
421
|
-
import pulumi_gcp as gcp
|
422
|
-
|
423
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
424
|
-
"role": "roles/editor",
|
425
|
-
"members": ["user:jane@example.com"],
|
426
|
-
}])
|
427
|
-
dataset = gcp.healthcare.DatasetIamPolicy("dataset",
|
428
|
-
dataset_id="your-dataset-id",
|
429
|
-
policy_data=admin.policy_data)
|
430
|
-
```
|
431
|
-
|
432
402
|
## healthcare.DatasetIamBinding
|
433
403
|
|
434
404
|
```python
|