pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
pulumi_gcp/serviceaccount/key.py
CHANGED
@@ -402,9 +402,9 @@ class Key(pulumi.CustomResource):
|
|
402
402
|
display_name="My Service Account")
|
403
403
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
404
404
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
405
|
-
metadata=
|
406
|
-
name
|
407
|
-
|
405
|
+
metadata={
|
406
|
+
"name": "google-application-credentials",
|
407
|
+
},
|
408
408
|
data={
|
409
409
|
"credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
410
410
|
})
|
@@ -488,9 +488,9 @@ class Key(pulumi.CustomResource):
|
|
488
488
|
display_name="My Service Account")
|
489
489
|
mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
|
490
490
|
google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
|
491
|
-
metadata=
|
492
|
-
name
|
493
|
-
|
491
|
+
metadata={
|
492
|
+
"name": "google-application-credentials",
|
493
|
+
},
|
494
494
|
data={
|
495
495
|
"credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
|
496
496
|
})
|
@@ -280,6 +280,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Namespace
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
293
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Namespace
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
466
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|
@@ -280,6 +280,26 @@ class NamespaceIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Namespace
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
293
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class NamespaceIamMember(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Namespace
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
466
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|
@@ -177,6 +177,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
+
|
182
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
+
---
|
184
|
+
|
185
|
+
# IAM policy for Service Directory Namespace
|
186
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
187
|
+
|
188
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
189
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
190
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
191
|
+
|
192
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
+
|
194
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
195
|
+
|
196
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
197
|
+
|
198
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
+
|
180
200
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
181
201
|
|
182
202
|
```python
|
@@ -318,6 +338,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
|
|
318
338
|
member="user:jane@example.com")
|
319
339
|
```
|
320
340
|
|
341
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
342
|
+
|
343
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
344
|
+
---
|
345
|
+
|
346
|
+
# IAM policy for Service Directory Namespace
|
347
|
+
Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
|
348
|
+
|
349
|
+
* `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
|
350
|
+
* `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
|
351
|
+
* `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
|
352
|
+
|
353
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
354
|
+
|
355
|
+
* `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
|
356
|
+
|
357
|
+
> **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
|
358
|
+
|
359
|
+
> **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
|
360
|
+
|
321
361
|
## google\\_service\\_directory\\_namespace\\_iam\\_policy
|
322
362
|
|
323
363
|
```python
|
@@ -280,6 +280,26 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Service
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
293
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class ServiceIamBinding(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Service
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
466
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|
@@ -280,6 +280,26 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Service Directory Service
|
289
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
292
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
293
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
298
|
+
|
299
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
284
304
|
|
285
305
|
```python
|
@@ -433,6 +453,26 @@ class ServiceIamMember(pulumi.CustomResource):
|
|
433
453
|
member="user:jane@example.com")
|
434
454
|
```
|
435
455
|
|
456
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
457
|
+
|
458
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
459
|
+
---
|
460
|
+
|
461
|
+
# IAM policy for Service Directory Service
|
462
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
463
|
+
|
464
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
465
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
466
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
467
|
+
|
468
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
469
|
+
|
470
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
471
|
+
|
472
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
473
|
+
|
474
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
475
|
+
|
436
476
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
437
477
|
|
438
478
|
```python
|
@@ -177,6 +177,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
+
|
182
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
+
---
|
184
|
+
|
185
|
+
# IAM policy for Service Directory Service
|
186
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
187
|
+
|
188
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
189
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
190
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
191
|
+
|
192
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
+
|
194
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
195
|
+
|
196
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
197
|
+
|
198
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
+
|
180
200
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
181
201
|
|
182
202
|
```python
|
@@ -318,6 +338,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
|
|
318
338
|
member="user:jane@example.com")
|
319
339
|
```
|
320
340
|
|
341
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
342
|
+
|
343
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
344
|
+
---
|
345
|
+
|
346
|
+
# IAM policy for Service Directory Service
|
347
|
+
Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
|
348
|
+
|
349
|
+
* `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
|
350
|
+
* `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
|
351
|
+
* `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
|
352
|
+
|
353
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
354
|
+
|
355
|
+
* `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
|
356
|
+
|
357
|
+
> **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
|
358
|
+
|
359
|
+
> **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
360
|
+
|
321
361
|
## google\\_service\\_directory\\_service\\_iam\\_policy
|
322
362
|
|
323
363
|
```python
|
@@ -319,6 +319,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Source Repositories Repository
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
330
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
331
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
336
|
+
|
337
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## sourcerepo.RepositoryIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -478,6 +497,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
|
|
478
497
|
member="user:jane@example.com")
|
479
498
|
```
|
480
499
|
|
500
|
+
## This resource supports User Project Overrides.
|
501
|
+
|
502
|
+
-
|
503
|
+
|
504
|
+
# IAM policy for Cloud Source Repositories Repository
|
505
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
506
|
+
|
507
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
508
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
509
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
510
|
+
|
511
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
512
|
+
|
513
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
514
|
+
|
515
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
516
|
+
|
517
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
518
|
+
|
481
519
|
## sourcerepo.RepositoryIamPolicy
|
482
520
|
|
483
521
|
```python
|
@@ -319,6 +319,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Source Repositories Repository
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
330
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
331
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
336
|
+
|
337
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## sourcerepo.RepositoryIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -478,6 +497,25 @@ class RepositoryIamMember(pulumi.CustomResource):
|
|
478
497
|
member="user:jane@example.com")
|
479
498
|
```
|
480
499
|
|
500
|
+
## This resource supports User Project Overrides.
|
501
|
+
|
502
|
+
-
|
503
|
+
|
504
|
+
# IAM policy for Cloud Source Repositories Repository
|
505
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
506
|
+
|
507
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
508
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
509
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
510
|
+
|
511
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
512
|
+
|
513
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
514
|
+
|
515
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
516
|
+
|
517
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
518
|
+
|
481
519
|
## sourcerepo.RepositoryIamPolicy
|
482
520
|
|
483
521
|
```python
|
@@ -216,6 +216,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Cloud Source Repositories Repository
|
224
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
227
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
228
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
233
|
+
|
234
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## sourcerepo.RepositoryIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -363,6 +382,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
|
|
363
382
|
member="user:jane@example.com")
|
364
383
|
```
|
365
384
|
|
385
|
+
## This resource supports User Project Overrides.
|
386
|
+
|
387
|
+
-
|
388
|
+
|
389
|
+
# IAM policy for Cloud Source Repositories Repository
|
390
|
+
Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
|
391
|
+
|
392
|
+
* `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
|
393
|
+
* `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
|
394
|
+
* `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
|
395
|
+
|
396
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
397
|
+
|
398
|
+
* `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
|
399
|
+
|
400
|
+
> **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
|
401
|
+
|
402
|
+
> **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
|
403
|
+
|
366
404
|
## sourcerepo.RepositoryIamPolicy
|
367
405
|
|
368
406
|
```python
|
@@ -407,43 +407,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
|
|
407
407
|
})
|
408
408
|
```
|
409
409
|
|
410
|
-
## spanner.DatabaseIAMPolicy
|
411
|
-
|
412
|
-
```python
|
413
|
-
import pulumi
|
414
|
-
import pulumi_gcp as gcp
|
415
|
-
|
416
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
417
|
-
"role": "roles/editor",
|
418
|
-
"members": ["user:jane@example.com"],
|
419
|
-
}])
|
420
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
421
|
-
instance="your-instance-name",
|
422
|
-
database="your-database-name",
|
423
|
-
policy_data=admin.policy_data)
|
424
|
-
```
|
425
|
-
|
426
|
-
With IAM Conditions:
|
427
|
-
|
428
|
-
```python
|
429
|
-
import pulumi
|
430
|
-
import pulumi_gcp as gcp
|
431
|
-
|
432
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
433
|
-
"role": "roles/editor",
|
434
|
-
"members": ["user:jane@example.com"],
|
435
|
-
"condition": {
|
436
|
-
"title": "My Role",
|
437
|
-
"description": "Grant permissions on my_role",
|
438
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
439
|
-
},
|
440
|
-
}])
|
441
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
442
|
-
instance="your-instance-name",
|
443
|
-
database="your-database-name",
|
444
|
-
policy_data=admin.policy_data)
|
445
|
-
```
|
446
|
-
|
447
410
|
## spanner.DatabaseIAMBinding
|
448
411
|
|
449
412
|
```python
|
@@ -671,43 +634,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
|
|
671
634
|
})
|
672
635
|
```
|
673
636
|
|
674
|
-
## spanner.DatabaseIAMPolicy
|
675
|
-
|
676
|
-
```python
|
677
|
-
import pulumi
|
678
|
-
import pulumi_gcp as gcp
|
679
|
-
|
680
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
681
|
-
"role": "roles/editor",
|
682
|
-
"members": ["user:jane@example.com"],
|
683
|
-
}])
|
684
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
685
|
-
instance="your-instance-name",
|
686
|
-
database="your-database-name",
|
687
|
-
policy_data=admin.policy_data)
|
688
|
-
```
|
689
|
-
|
690
|
-
With IAM Conditions:
|
691
|
-
|
692
|
-
```python
|
693
|
-
import pulumi
|
694
|
-
import pulumi_gcp as gcp
|
695
|
-
|
696
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
697
|
-
"role": "roles/editor",
|
698
|
-
"members": ["user:jane@example.com"],
|
699
|
-
"condition": {
|
700
|
-
"title": "My Role",
|
701
|
-
"description": "Grant permissions on my_role",
|
702
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
703
|
-
},
|
704
|
-
}])
|
705
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
706
|
-
instance="your-instance-name",
|
707
|
-
database="your-database-name",
|
708
|
-
policy_data=admin.policy_data)
|
709
|
-
```
|
710
|
-
|
711
637
|
## spanner.DatabaseIAMBinding
|
712
638
|
|
713
639
|
```python
|