pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -280,6 +280,26 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
289
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
292
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
293
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
298
|
+
|
299
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## accesscontextmanager.AccessPolicyIamPolicy
|
284
304
|
|
285
305
|
```python
|
@@ -431,6 +451,26 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
|
|
431
451
|
member="user:jane@example.com")
|
432
452
|
```
|
433
453
|
|
454
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
455
|
+
|
456
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
457
|
+
---
|
458
|
+
|
459
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
460
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
461
|
+
|
462
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
463
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
464
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
465
|
+
|
466
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
467
|
+
|
468
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
469
|
+
|
470
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
471
|
+
|
472
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
473
|
+
|
434
474
|
## accesscontextmanager.AccessPolicyIamPolicy
|
435
475
|
|
436
476
|
```python
|
@@ -280,6 +280,26 @@ class AccessPolicyIamMember(pulumi.CustomResource):
|
|
280
280
|
member="user:jane@example.com")
|
281
281
|
```
|
282
282
|
|
283
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
284
|
+
|
285
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
286
|
+
---
|
287
|
+
|
288
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
289
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
290
|
+
|
291
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
292
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
293
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
294
|
+
|
295
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
296
|
+
|
297
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
298
|
+
|
299
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
300
|
+
|
301
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
302
|
+
|
283
303
|
## accesscontextmanager.AccessPolicyIamPolicy
|
284
304
|
|
285
305
|
```python
|
@@ -431,6 +451,26 @@ class AccessPolicyIamMember(pulumi.CustomResource):
|
|
431
451
|
member="user:jane@example.com")
|
432
452
|
```
|
433
453
|
|
454
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
455
|
+
|
456
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
457
|
+
---
|
458
|
+
|
459
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
460
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
461
|
+
|
462
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
463
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
464
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
465
|
+
|
466
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
467
|
+
|
468
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
469
|
+
|
470
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
471
|
+
|
472
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
473
|
+
|
434
474
|
## accesscontextmanager.AccessPolicyIamPolicy
|
435
475
|
|
436
476
|
```python
|
@@ -177,6 +177,26 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
|
|
177
177
|
member="user:jane@example.com")
|
178
178
|
```
|
179
179
|
|
180
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
181
|
+
|
182
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
183
|
+
---
|
184
|
+
|
185
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
186
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
187
|
+
|
188
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
189
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
190
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
191
|
+
|
192
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
193
|
+
|
194
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
195
|
+
|
196
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
197
|
+
|
198
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
199
|
+
|
180
200
|
## accesscontextmanager.AccessPolicyIamPolicy
|
181
201
|
|
182
202
|
```python
|
@@ -316,6 +336,26 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
|
|
316
336
|
member="user:jane@example.com")
|
317
337
|
```
|
318
338
|
|
339
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
340
|
+
|
341
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
342
|
+
---
|
343
|
+
|
344
|
+
# IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
|
345
|
+
Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
|
346
|
+
|
347
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
|
348
|
+
* `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
|
349
|
+
* `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
|
350
|
+
|
351
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
352
|
+
|
353
|
+
* `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
|
354
|
+
|
355
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
|
356
|
+
|
357
|
+
> **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
|
358
|
+
|
319
359
|
## accesscontextmanager.AccessPolicyIamPolicy
|
320
360
|
|
321
361
|
```python
|
@@ -347,6 +347,25 @@ class ApiConfigIamBinding(pulumi.CustomResource):
|
|
347
347
|
member="user:jane@example.com")
|
348
348
|
```
|
349
349
|
|
350
|
+
## This resource supports User Project Overrides.
|
351
|
+
|
352
|
+
-
|
353
|
+
|
354
|
+
# IAM policy for API Gateway ApiConfig
|
355
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
356
|
+
|
357
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
358
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
359
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
360
|
+
|
361
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
362
|
+
|
363
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
364
|
+
|
365
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
366
|
+
|
367
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
368
|
+
|
350
369
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
351
370
|
|
352
371
|
```python
|
@@ -511,6 +530,25 @@ class ApiConfigIamBinding(pulumi.CustomResource):
|
|
511
530
|
member="user:jane@example.com")
|
512
531
|
```
|
513
532
|
|
533
|
+
## This resource supports User Project Overrides.
|
534
|
+
|
535
|
+
-
|
536
|
+
|
537
|
+
# IAM policy for API Gateway ApiConfig
|
538
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
539
|
+
|
540
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
541
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
542
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
543
|
+
|
544
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
545
|
+
|
546
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
547
|
+
|
548
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
549
|
+
|
550
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
551
|
+
|
514
552
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
515
553
|
|
516
554
|
```python
|
@@ -347,6 +347,25 @@ class ApiConfigIamMember(pulumi.CustomResource):
|
|
347
347
|
member="user:jane@example.com")
|
348
348
|
```
|
349
349
|
|
350
|
+
## This resource supports User Project Overrides.
|
351
|
+
|
352
|
+
-
|
353
|
+
|
354
|
+
# IAM policy for API Gateway ApiConfig
|
355
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
356
|
+
|
357
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
358
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
359
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
360
|
+
|
361
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
362
|
+
|
363
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
364
|
+
|
365
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
366
|
+
|
367
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
368
|
+
|
350
369
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
351
370
|
|
352
371
|
```python
|
@@ -511,6 +530,25 @@ class ApiConfigIamMember(pulumi.CustomResource):
|
|
511
530
|
member="user:jane@example.com")
|
512
531
|
```
|
513
532
|
|
533
|
+
## This resource supports User Project Overrides.
|
534
|
+
|
535
|
+
-
|
536
|
+
|
537
|
+
# IAM policy for API Gateway ApiConfig
|
538
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
539
|
+
|
540
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
541
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
542
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
543
|
+
|
544
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
545
|
+
|
546
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
547
|
+
|
548
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
549
|
+
|
550
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
551
|
+
|
514
552
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
515
553
|
|
516
554
|
```python
|
@@ -244,6 +244,25 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
|
|
244
244
|
member="user:jane@example.com")
|
245
245
|
```
|
246
246
|
|
247
|
+
## This resource supports User Project Overrides.
|
248
|
+
|
249
|
+
-
|
250
|
+
|
251
|
+
# IAM policy for API Gateway ApiConfig
|
252
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
253
|
+
|
254
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
255
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
256
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
257
|
+
|
258
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
259
|
+
|
260
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
261
|
+
|
262
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
263
|
+
|
264
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
265
|
+
|
247
266
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
248
267
|
|
249
268
|
```python
|
@@ -396,6 +415,25 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
|
|
396
415
|
member="user:jane@example.com")
|
397
416
|
```
|
398
417
|
|
418
|
+
## This resource supports User Project Overrides.
|
419
|
+
|
420
|
+
-
|
421
|
+
|
422
|
+
# IAM policy for API Gateway ApiConfig
|
423
|
+
Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
|
424
|
+
|
425
|
+
* `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
|
426
|
+
* `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
|
427
|
+
* `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
|
428
|
+
|
429
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
430
|
+
|
431
|
+
* `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
|
432
|
+
|
433
|
+
> **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
|
434
|
+
|
435
|
+
> **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
436
|
+
|
399
437
|
## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
|
400
438
|
|
401
439
|
```python
|
@@ -311,6 +311,25 @@ class ApiIamBinding(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
+
## This resource supports User Project Overrides.
|
315
|
+
|
316
|
+
-
|
317
|
+
|
318
|
+
# IAM policy for API Gateway Api
|
319
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
320
|
+
|
321
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
322
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
323
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
324
|
+
|
325
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
+
|
327
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
328
|
+
|
329
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
330
|
+
|
331
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
+
|
314
333
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
315
334
|
|
316
335
|
```python
|
@@ -471,6 +490,25 @@ class ApiIamBinding(pulumi.CustomResource):
|
|
471
490
|
member="user:jane@example.com")
|
472
491
|
```
|
473
492
|
|
493
|
+
## This resource supports User Project Overrides.
|
494
|
+
|
495
|
+
-
|
496
|
+
|
497
|
+
# IAM policy for API Gateway Api
|
498
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
499
|
+
|
500
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
501
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
502
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
503
|
+
|
504
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
+
|
506
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
507
|
+
|
508
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
509
|
+
|
510
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
+
|
474
512
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
475
513
|
|
476
514
|
```python
|
@@ -311,6 +311,25 @@ class ApiIamMember(pulumi.CustomResource):
|
|
311
311
|
member="user:jane@example.com")
|
312
312
|
```
|
313
313
|
|
314
|
+
## This resource supports User Project Overrides.
|
315
|
+
|
316
|
+
-
|
317
|
+
|
318
|
+
# IAM policy for API Gateway Api
|
319
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
320
|
+
|
321
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
322
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
323
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
324
|
+
|
325
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
326
|
+
|
327
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
328
|
+
|
329
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
330
|
+
|
331
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
332
|
+
|
314
333
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
315
334
|
|
316
335
|
```python
|
@@ -471,6 +490,25 @@ class ApiIamMember(pulumi.CustomResource):
|
|
471
490
|
member="user:jane@example.com")
|
472
491
|
```
|
473
492
|
|
493
|
+
## This resource supports User Project Overrides.
|
494
|
+
|
495
|
+
-
|
496
|
+
|
497
|
+
# IAM policy for API Gateway Api
|
498
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
499
|
+
|
500
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
501
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
502
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
503
|
+
|
504
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
505
|
+
|
506
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
507
|
+
|
508
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
509
|
+
|
510
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
511
|
+
|
474
512
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
475
513
|
|
476
514
|
```python
|
@@ -208,6 +208,25 @@ class ApiIamPolicy(pulumi.CustomResource):
|
|
208
208
|
member="user:jane@example.com")
|
209
209
|
```
|
210
210
|
|
211
|
+
## This resource supports User Project Overrides.
|
212
|
+
|
213
|
+
-
|
214
|
+
|
215
|
+
# IAM policy for API Gateway Api
|
216
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
217
|
+
|
218
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
219
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
220
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
221
|
+
|
222
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
223
|
+
|
224
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
225
|
+
|
226
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
227
|
+
|
228
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
229
|
+
|
211
230
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
212
231
|
|
213
232
|
```python
|
@@ -356,6 +375,25 @@ class ApiIamPolicy(pulumi.CustomResource):
|
|
356
375
|
member="user:jane@example.com")
|
357
376
|
```
|
358
377
|
|
378
|
+
## This resource supports User Project Overrides.
|
379
|
+
|
380
|
+
-
|
381
|
+
|
382
|
+
# IAM policy for API Gateway Api
|
383
|
+
Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
|
384
|
+
|
385
|
+
* `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
|
386
|
+
* `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
|
387
|
+
* `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
|
388
|
+
|
389
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
390
|
+
|
391
|
+
* `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
|
392
|
+
|
393
|
+
> **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
|
394
|
+
|
395
|
+
> **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
|
396
|
+
|
359
397
|
## google\\_api\\_gateway\\_api\\_iam\\_policy
|
360
398
|
|
361
399
|
```python
|
@@ -359,6 +359,25 @@ class GatewayIamBinding(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for API Gateway Gateway
|
367
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
370
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
371
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
376
|
+
|
377
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class GatewayIamBinding(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for API Gateway Gateway
|
558
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
561
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
562
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
567
|
+
|
568
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
535
573
|
|
536
574
|
```python
|
@@ -359,6 +359,25 @@ class GatewayIamMember(pulumi.CustomResource):
|
|
359
359
|
member="user:jane@example.com")
|
360
360
|
```
|
361
361
|
|
362
|
+
## This resource supports User Project Overrides.
|
363
|
+
|
364
|
+
-
|
365
|
+
|
366
|
+
# IAM policy for API Gateway Gateway
|
367
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
368
|
+
|
369
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
370
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
371
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
372
|
+
|
373
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
374
|
+
|
375
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
376
|
+
|
377
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
378
|
+
|
379
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
380
|
+
|
362
381
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
363
382
|
|
364
383
|
```python
|
@@ -531,6 +550,25 @@ class GatewayIamMember(pulumi.CustomResource):
|
|
531
550
|
member="user:jane@example.com")
|
532
551
|
```
|
533
552
|
|
553
|
+
## This resource supports User Project Overrides.
|
554
|
+
|
555
|
+
-
|
556
|
+
|
557
|
+
# IAM policy for API Gateway Gateway
|
558
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
559
|
+
|
560
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
561
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
562
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
563
|
+
|
564
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
565
|
+
|
566
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
567
|
+
|
568
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
569
|
+
|
570
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
571
|
+
|
534
572
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
535
573
|
|
536
574
|
```python
|
@@ -256,6 +256,25 @@ class GatewayIamPolicy(pulumi.CustomResource):
|
|
256
256
|
member="user:jane@example.com")
|
257
257
|
```
|
258
258
|
|
259
|
+
## This resource supports User Project Overrides.
|
260
|
+
|
261
|
+
-
|
262
|
+
|
263
|
+
# IAM policy for API Gateway Gateway
|
264
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
265
|
+
|
266
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
267
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
268
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
269
|
+
|
270
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
271
|
+
|
272
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
273
|
+
|
274
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
275
|
+
|
276
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
277
|
+
|
259
278
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
260
279
|
|
261
280
|
```python
|
@@ -416,6 +435,25 @@ class GatewayIamPolicy(pulumi.CustomResource):
|
|
416
435
|
member="user:jane@example.com")
|
417
436
|
```
|
418
437
|
|
438
|
+
## This resource supports User Project Overrides.
|
439
|
+
|
440
|
+
-
|
441
|
+
|
442
|
+
# IAM policy for API Gateway Gateway
|
443
|
+
Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
|
444
|
+
|
445
|
+
* `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
|
446
|
+
* `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
|
447
|
+
* `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
|
448
|
+
|
449
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
450
|
+
|
451
|
+
* `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
|
452
|
+
|
453
|
+
> **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
|
454
|
+
|
455
|
+
> **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
|
456
|
+
|
419
457
|
## google\\_api\\_gateway\\_gateway\\_iam\\_policy
|
420
458
|
|
421
459
|
```python
|