pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -279,6 +279,26 @@ class PolicyTagIamMember(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Data catalog PolicyTag
|
288
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
291
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
292
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
297
|
+
|
298
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## datacatalog.PolicyTagIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -428,6 +448,26 @@ class PolicyTagIamMember(pulumi.CustomResource):
|
|
428
448
|
member="user:jane@example.com")
|
429
449
|
```
|
430
450
|
|
451
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
452
|
+
|
453
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
454
|
+
---
|
455
|
+
|
456
|
+
# IAM policy for Data catalog PolicyTag
|
457
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
458
|
+
|
459
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
460
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
461
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
462
|
+
|
463
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
+
|
465
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
466
|
+
|
467
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
468
|
+
|
469
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
+
|
431
471
|
## datacatalog.PolicyTagIamPolicy
|
432
472
|
|
433
473
|
```python
|
@@ -176,6 +176,26 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
|
|
176
176
|
member="user:jane@example.com")
|
177
177
|
```
|
178
178
|
|
179
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
180
|
+
|
181
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
182
|
+
---
|
183
|
+
|
184
|
+
# IAM policy for Data catalog PolicyTag
|
185
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
186
|
+
|
187
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
188
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
189
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
190
|
+
|
191
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
192
|
+
|
193
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
194
|
+
|
195
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
196
|
+
|
197
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
198
|
+
|
179
199
|
## datacatalog.PolicyTagIamPolicy
|
180
200
|
|
181
201
|
```python
|
@@ -313,6 +333,26 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
|
|
313
333
|
member="user:jane@example.com")
|
314
334
|
```
|
315
335
|
|
336
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
337
|
+
|
338
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
339
|
+
---
|
340
|
+
|
341
|
+
# IAM policy for Data catalog PolicyTag
|
342
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
343
|
+
|
344
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
345
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
346
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
347
|
+
|
348
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
349
|
+
|
350
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
351
|
+
|
352
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
353
|
+
|
354
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
355
|
+
|
316
356
|
## datacatalog.PolicyTagIamPolicy
|
317
357
|
|
318
358
|
```python
|
@@ -341,6 +341,25 @@ class TagTemplateIamBinding(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog TagTemplate
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
353
|
+
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.TagTemplateIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class TagTemplateIamBinding(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog TagTemplate
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
529
|
+
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.TagTemplateIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -341,6 +341,25 @@ class TagTemplateIamMember(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog TagTemplate
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
353
|
+
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.TagTemplateIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class TagTemplateIamMember(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog TagTemplate
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
529
|
+
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.TagTemplateIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -238,6 +238,25 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
|
|
238
238
|
member="user:jane@example.com")
|
239
239
|
```
|
240
240
|
|
241
|
+
## This resource supports User Project Overrides.
|
242
|
+
|
243
|
+
-
|
244
|
+
|
245
|
+
# IAM policy for Data catalog TagTemplate
|
246
|
+
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
247
|
+
|
248
|
+
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
249
|
+
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
250
|
+
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
251
|
+
|
252
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
253
|
+
|
254
|
+
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
255
|
+
|
256
|
+
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
257
|
+
|
258
|
+
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
259
|
+
|
241
260
|
## datacatalog.TagTemplateIamPolicy
|
242
261
|
|
243
262
|
```python
|
@@ -383,6 +402,25 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
|
|
383
402
|
member="user:jane@example.com")
|
384
403
|
```
|
385
404
|
|
405
|
+
## This resource supports User Project Overrides.
|
406
|
+
|
407
|
+
-
|
408
|
+
|
409
|
+
# IAM policy for Data catalog TagTemplate
|
410
|
+
Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
|
411
|
+
|
412
|
+
* `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
|
413
|
+
* `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
|
414
|
+
* `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
|
415
|
+
|
416
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
+
|
418
|
+
* `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
|
419
|
+
|
420
|
+
> **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
|
421
|
+
|
422
|
+
> **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
+
|
386
424
|
## datacatalog.TagTemplateIamPolicy
|
387
425
|
|
388
426
|
```python
|
@@ -341,6 +341,25 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog Taxonomy
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
353
|
+
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.TaxonomyIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog Taxonomy
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
529
|
+
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.TaxonomyIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -341,6 +341,25 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog Taxonomy
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
353
|
+
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.TaxonomyIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog Taxonomy
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
529
|
+
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.TaxonomyIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -238,6 +238,25 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
238
238
|
member="user:jane@example.com")
|
239
239
|
```
|
240
240
|
|
241
|
+
## This resource supports User Project Overrides.
|
242
|
+
|
243
|
+
-
|
244
|
+
|
245
|
+
# IAM policy for Data catalog Taxonomy
|
246
|
+
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
247
|
+
|
248
|
+
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
249
|
+
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
250
|
+
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
251
|
+
|
252
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
253
|
+
|
254
|
+
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
255
|
+
|
256
|
+
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
257
|
+
|
258
|
+
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
259
|
+
|
241
260
|
## datacatalog.TaxonomyIamPolicy
|
242
261
|
|
243
262
|
```python
|
@@ -383,6 +402,25 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
383
402
|
member="user:jane@example.com")
|
384
403
|
```
|
385
404
|
|
405
|
+
## This resource supports User Project Overrides.
|
406
|
+
|
407
|
+
-
|
408
|
+
|
409
|
+
# IAM policy for Data catalog Taxonomy
|
410
|
+
Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
|
411
|
+
|
412
|
+
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
413
|
+
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
414
|
+
* `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
|
415
|
+
|
416
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
+
|
418
|
+
* `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
|
419
|
+
|
420
|
+
> **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
|
421
|
+
|
422
|
+
> **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
+
|
386
424
|
## datacatalog.TaxonomyIamPolicy
|
387
425
|
|
388
426
|
```python
|
@@ -359,6 +359,25 @@ class AspectTypeIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex AspectType
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
370
|
+
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
371
|
+
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
376
|
+
|
377
|
+
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.AspectTypeIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class AspectTypeIamBinding(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex AspectType
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
561
|
+
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
562
|
+
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
567
|
+
|
568
|
+
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.AspectTypeIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -359,6 +359,25 @@ class AspectTypeIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for Dataplex AspectType
|
367
|
+
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
370
|
+
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
371
|
+
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
376
|
+
|
377
|
+
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## dataplex.AspectTypeIamPolicy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class AspectTypeIamMember(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for Dataplex AspectType
|
558
|
+
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
561
|
+
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
562
|
+
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
567
|
+
|
568
|
+
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## dataplex.AspectTypeIamPolicy
|
535
573
|
|
536
574
|
```python
|
@@ -256,6 +256,25 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for Dataplex AspectType
|
264
|
+
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
267
|
+
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
268
|
+
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
273
|
+
|
274
|
+
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## dataplex.AspectTypeIamPolicy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for Dataplex AspectType
|
443
|
+
Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
|
446
|
+
* `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
|
447
|
+
* `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
|
452
|
+
|
453
|
+
> **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## dataplex.AspectTypeIamPolicy
|
420
458
|
|
421
459
|
```python
|
@@ -401,6 +401,25 @@ class AssetIamBinding(pulumi.CustomResource):
|
|
401
401
|
member="user:jane@example.com")
|
402
402
|
```
|
403
403
|
|
404
|
+
## This resource supports User Project Overrides.
|
405
|
+
|
406
|
+
-
|
407
|
+
|
408
|
+
# IAM policy for Dataplex Asset
|
409
|
+
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
410
|
+
|
411
|
+
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
412
|
+
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
413
|
+
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
414
|
+
|
415
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
416
|
+
|
417
|
+
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
418
|
+
|
419
|
+
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
420
|
+
|
421
|
+
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
422
|
+
|
404
423
|
## dataplex.AssetIamPolicy
|
405
424
|
|
406
425
|
```python
|
@@ -582,6 +601,25 @@ class AssetIamBinding(pulumi.CustomResource):
|
|
582
601
|
member="user:jane@example.com")
|
583
602
|
```
|
584
603
|
|
604
|
+
## This resource supports User Project Overrides.
|
605
|
+
|
606
|
+
-
|
607
|
+
|
608
|
+
# IAM policy for Dataplex Asset
|
609
|
+
Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
|
610
|
+
|
611
|
+
* `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
|
612
|
+
* `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
|
613
|
+
* `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
|
614
|
+
|
615
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
616
|
+
|
617
|
+
* `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
|
618
|
+
|
619
|
+
> **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
|
620
|
+
|
621
|
+
> **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
|
622
|
+
|
585
623
|
## dataplex.AssetIamPolicy
|
586
624
|
|
587
625
|
```python
|