pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -304,6 +304,27 @@ class TunnelInstanceIAMPolicy(pulumi.CustomResource):
|
|
304
304
|
})
|
305
305
|
```
|
306
306
|
|
307
|
+
## This resource supports User Project Overrides.
|
308
|
+
|
309
|
+
-
|
310
|
+
|
311
|
+
# IAM policy for Identity-Aware Proxy TunnelInstance
|
312
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
313
|
+
|
314
|
+
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
315
|
+
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
316
|
+
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
317
|
+
|
318
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
319
|
+
|
320
|
+
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
321
|
+
|
322
|
+
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
323
|
+
|
324
|
+
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
325
|
+
|
326
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
327
|
+
|
307
328
|
## iap.TunnelInstanceIAMPolicy
|
308
329
|
|
309
330
|
```python
|
@@ -581,6 +602,27 @@ class TunnelInstanceIAMPolicy(pulumi.CustomResource):
|
|
581
602
|
})
|
582
603
|
```
|
583
604
|
|
605
|
+
## This resource supports User Project Overrides.
|
606
|
+
|
607
|
+
-
|
608
|
+
|
609
|
+
# IAM policy for Identity-Aware Proxy TunnelInstance
|
610
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
611
|
+
|
612
|
+
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
613
|
+
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
614
|
+
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
615
|
+
|
616
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
617
|
+
|
618
|
+
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
619
|
+
|
620
|
+
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
621
|
+
|
622
|
+
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
623
|
+
|
624
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
625
|
+
|
584
626
|
## iap.TunnelInstanceIAMPolicy
|
585
627
|
|
586
628
|
```python
|
@@ -388,6 +388,27 @@ class WebBackendServiceIamBinding(pulumi.CustomResource):
|
|
388
388
|
})
|
389
389
|
```
|
390
390
|
|
391
|
+
## This resource supports User Project Overrides.
|
392
|
+
|
393
|
+
-
|
394
|
+
|
395
|
+
# IAM policy for Identity-Aware Proxy WebBackendService
|
396
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebBackendService. Each of these resources serves a different use case:
|
397
|
+
|
398
|
+
* `iap.WebBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webbackendservice and replaces any existing policy already attached.
|
399
|
+
* `iap.WebBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webbackendservice are preserved.
|
400
|
+
* `iap.WebBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webbackendservice are preserved.
|
401
|
+
|
402
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
+
|
404
|
+
* `iap.WebBackendServiceIamPolicy`: Retrieves the IAM policy for the webbackendservice
|
405
|
+
|
406
|
+
> **Note:** `iap.WebBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebBackendServiceIamBinding` and `iap.WebBackendServiceIamMember` or they will fight over what your policy should be.
|
407
|
+
|
408
|
+
> **Note:** `iap.WebBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
+
|
410
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
411
|
+
|
391
412
|
## iap.WebBackendServiceIamPolicy
|
392
413
|
|
393
414
|
```python
|
@@ -663,6 +684,27 @@ class WebBackendServiceIamBinding(pulumi.CustomResource):
|
|
663
684
|
})
|
664
685
|
```
|
665
686
|
|
687
|
+
## This resource supports User Project Overrides.
|
688
|
+
|
689
|
+
-
|
690
|
+
|
691
|
+
# IAM policy for Identity-Aware Proxy WebBackendService
|
692
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebBackendService. Each of these resources serves a different use case:
|
693
|
+
|
694
|
+
* `iap.WebBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webbackendservice and replaces any existing policy already attached.
|
695
|
+
* `iap.WebBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webbackendservice are preserved.
|
696
|
+
* `iap.WebBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webbackendservice are preserved.
|
697
|
+
|
698
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
699
|
+
|
700
|
+
* `iap.WebBackendServiceIamPolicy`: Retrieves the IAM policy for the webbackendservice
|
701
|
+
|
702
|
+
> **Note:** `iap.WebBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebBackendServiceIamBinding` and `iap.WebBackendServiceIamMember` or they will fight over what your policy should be.
|
703
|
+
|
704
|
+
> **Note:** `iap.WebBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
705
|
+
|
706
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
707
|
+
|
666
708
|
## iap.WebBackendServiceIamPolicy
|
667
709
|
|
668
710
|
```python
|
@@ -388,6 +388,27 @@ class WebBackendServiceIamMember(pulumi.CustomResource):
|
|
388
388
|
})
|
389
389
|
```
|
390
390
|
|
391
|
+
## This resource supports User Project Overrides.
|
392
|
+
|
393
|
+
-
|
394
|
+
|
395
|
+
# IAM policy for Identity-Aware Proxy WebBackendService
|
396
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebBackendService. Each of these resources serves a different use case:
|
397
|
+
|
398
|
+
* `iap.WebBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webbackendservice and replaces any existing policy already attached.
|
399
|
+
* `iap.WebBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webbackendservice are preserved.
|
400
|
+
* `iap.WebBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webbackendservice are preserved.
|
401
|
+
|
402
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
+
|
404
|
+
* `iap.WebBackendServiceIamPolicy`: Retrieves the IAM policy for the webbackendservice
|
405
|
+
|
406
|
+
> **Note:** `iap.WebBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebBackendServiceIamBinding` and `iap.WebBackendServiceIamMember` or they will fight over what your policy should be.
|
407
|
+
|
408
|
+
> **Note:** `iap.WebBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
+
|
410
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
411
|
+
|
391
412
|
## iap.WebBackendServiceIamPolicy
|
392
413
|
|
393
414
|
```python
|
@@ -663,6 +684,27 @@ class WebBackendServiceIamMember(pulumi.CustomResource):
|
|
663
684
|
})
|
664
685
|
```
|
665
686
|
|
687
|
+
## This resource supports User Project Overrides.
|
688
|
+
|
689
|
+
-
|
690
|
+
|
691
|
+
# IAM policy for Identity-Aware Proxy WebBackendService
|
692
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebBackendService. Each of these resources serves a different use case:
|
693
|
+
|
694
|
+
* `iap.WebBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webbackendservice and replaces any existing policy already attached.
|
695
|
+
* `iap.WebBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webbackendservice are preserved.
|
696
|
+
* `iap.WebBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webbackendservice are preserved.
|
697
|
+
|
698
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
699
|
+
|
700
|
+
* `iap.WebBackendServiceIamPolicy`: Retrieves the IAM policy for the webbackendservice
|
701
|
+
|
702
|
+
> **Note:** `iap.WebBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebBackendServiceIamBinding` and `iap.WebBackendServiceIamMember` or they will fight over what your policy should be.
|
703
|
+
|
704
|
+
> **Note:** `iap.WebBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
705
|
+
|
706
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
707
|
+
|
666
708
|
## iap.WebBackendServiceIamPolicy
|
667
709
|
|
668
710
|
```python
|
@@ -273,6 +273,27 @@ class WebBackendServiceIamPolicy(pulumi.CustomResource):
|
|
273
273
|
})
|
274
274
|
```
|
275
275
|
|
276
|
+
## This resource supports User Project Overrides.
|
277
|
+
|
278
|
+
-
|
279
|
+
|
280
|
+
# IAM policy for Identity-Aware Proxy WebBackendService
|
281
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebBackendService. Each of these resources serves a different use case:
|
282
|
+
|
283
|
+
* `iap.WebBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webbackendservice and replaces any existing policy already attached.
|
284
|
+
* `iap.WebBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webbackendservice are preserved.
|
285
|
+
* `iap.WebBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webbackendservice are preserved.
|
286
|
+
|
287
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
288
|
+
|
289
|
+
* `iap.WebBackendServiceIamPolicy`: Retrieves the IAM policy for the webbackendservice
|
290
|
+
|
291
|
+
> **Note:** `iap.WebBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebBackendServiceIamBinding` and `iap.WebBackendServiceIamMember` or they will fight over what your policy should be.
|
292
|
+
|
293
|
+
> **Note:** `iap.WebBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
294
|
+
|
295
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
296
|
+
|
276
297
|
## iap.WebBackendServiceIamPolicy
|
277
298
|
|
278
299
|
```python
|
@@ -534,6 +555,27 @@ class WebBackendServiceIamPolicy(pulumi.CustomResource):
|
|
534
555
|
})
|
535
556
|
```
|
536
557
|
|
558
|
+
## This resource supports User Project Overrides.
|
559
|
+
|
560
|
+
-
|
561
|
+
|
562
|
+
# IAM policy for Identity-Aware Proxy WebBackendService
|
563
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebBackendService. Each of these resources serves a different use case:
|
564
|
+
|
565
|
+
* `iap.WebBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webbackendservice and replaces any existing policy already attached.
|
566
|
+
* `iap.WebBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webbackendservice are preserved.
|
567
|
+
* `iap.WebBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webbackendservice are preserved.
|
568
|
+
|
569
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
570
|
+
|
571
|
+
* `iap.WebBackendServiceIamPolicy`: Retrieves the IAM policy for the webbackendservice
|
572
|
+
|
573
|
+
> **Note:** `iap.WebBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebBackendServiceIamBinding` and `iap.WebBackendServiceIamMember` or they will fight over what your policy should be.
|
574
|
+
|
575
|
+
> **Note:** `iap.WebBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
576
|
+
|
577
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
578
|
+
|
537
579
|
## iap.WebBackendServiceIamPolicy
|
538
580
|
|
539
581
|
```python
|
@@ -350,6 +350,27 @@ class WebIamBinding(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
+
## This resource supports User Project Overrides.
|
354
|
+
|
355
|
+
-
|
356
|
+
|
357
|
+
# IAM policy for Identity-Aware Proxy Web
|
358
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Web. Each of these resources serves a different use case:
|
359
|
+
|
360
|
+
* `iap.WebIamPolicy`: Authoritative. Sets the IAM policy for the web and replaces any existing policy already attached.
|
361
|
+
* `iap.WebIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the web are preserved.
|
362
|
+
* `iap.WebIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the web are preserved.
|
363
|
+
|
364
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
+
|
366
|
+
* `iap.WebIamPolicy`: Retrieves the IAM policy for the web
|
367
|
+
|
368
|
+
> **Note:** `iap.WebIamPolicy` **cannot** be used in conjunction with `iap.WebIamBinding` and `iap.WebIamMember` or they will fight over what your policy should be.
|
369
|
+
|
370
|
+
> **Note:** `iap.WebIamBinding` resources **can be** used in conjunction with `iap.WebIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
+
|
372
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
+
|
353
374
|
## iap.WebIamPolicy
|
354
375
|
|
355
376
|
```python
|
@@ -610,6 +631,27 @@ class WebIamBinding(pulumi.CustomResource):
|
|
610
631
|
})
|
611
632
|
```
|
612
633
|
|
634
|
+
## This resource supports User Project Overrides.
|
635
|
+
|
636
|
+
-
|
637
|
+
|
638
|
+
# IAM policy for Identity-Aware Proxy Web
|
639
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Web. Each of these resources serves a different use case:
|
640
|
+
|
641
|
+
* `iap.WebIamPolicy`: Authoritative. Sets the IAM policy for the web and replaces any existing policy already attached.
|
642
|
+
* `iap.WebIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the web are preserved.
|
643
|
+
* `iap.WebIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the web are preserved.
|
644
|
+
|
645
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
+
|
647
|
+
* `iap.WebIamPolicy`: Retrieves the IAM policy for the web
|
648
|
+
|
649
|
+
> **Note:** `iap.WebIamPolicy` **cannot** be used in conjunction with `iap.WebIamBinding` and `iap.WebIamMember` or they will fight over what your policy should be.
|
650
|
+
|
651
|
+
> **Note:** `iap.WebIamBinding` resources **can be** used in conjunction with `iap.WebIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
+
|
653
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
+
|
613
655
|
## iap.WebIamPolicy
|
614
656
|
|
615
657
|
```python
|
pulumi_gcp/iap/web_iam_member.py
CHANGED
@@ -350,6 +350,27 @@ class WebIamMember(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
+
## This resource supports User Project Overrides.
|
354
|
+
|
355
|
+
-
|
356
|
+
|
357
|
+
# IAM policy for Identity-Aware Proxy Web
|
358
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Web. Each of these resources serves a different use case:
|
359
|
+
|
360
|
+
* `iap.WebIamPolicy`: Authoritative. Sets the IAM policy for the web and replaces any existing policy already attached.
|
361
|
+
* `iap.WebIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the web are preserved.
|
362
|
+
* `iap.WebIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the web are preserved.
|
363
|
+
|
364
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
+
|
366
|
+
* `iap.WebIamPolicy`: Retrieves the IAM policy for the web
|
367
|
+
|
368
|
+
> **Note:** `iap.WebIamPolicy` **cannot** be used in conjunction with `iap.WebIamBinding` and `iap.WebIamMember` or they will fight over what your policy should be.
|
369
|
+
|
370
|
+
> **Note:** `iap.WebIamBinding` resources **can be** used in conjunction with `iap.WebIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
+
|
372
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
+
|
353
374
|
## iap.WebIamPolicy
|
354
375
|
|
355
376
|
```python
|
@@ -610,6 +631,27 @@ class WebIamMember(pulumi.CustomResource):
|
|
610
631
|
})
|
611
632
|
```
|
612
633
|
|
634
|
+
## This resource supports User Project Overrides.
|
635
|
+
|
636
|
+
-
|
637
|
+
|
638
|
+
# IAM policy for Identity-Aware Proxy Web
|
639
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Web. Each of these resources serves a different use case:
|
640
|
+
|
641
|
+
* `iap.WebIamPolicy`: Authoritative. Sets the IAM policy for the web and replaces any existing policy already attached.
|
642
|
+
* `iap.WebIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the web are preserved.
|
643
|
+
* `iap.WebIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the web are preserved.
|
644
|
+
|
645
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
+
|
647
|
+
* `iap.WebIamPolicy`: Retrieves the IAM policy for the web
|
648
|
+
|
649
|
+
> **Note:** `iap.WebIamPolicy` **cannot** be used in conjunction with `iap.WebIamBinding` and `iap.WebIamMember` or they will fight over what your policy should be.
|
650
|
+
|
651
|
+
> **Note:** `iap.WebIamBinding` resources **can be** used in conjunction with `iap.WebIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
+
|
653
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
+
|
613
655
|
## iap.WebIamPolicy
|
614
656
|
|
615
657
|
```python
|
pulumi_gcp/iap/web_iam_policy.py
CHANGED
@@ -235,6 +235,27 @@ class WebIamPolicy(pulumi.CustomResource):
|
|
235
235
|
})
|
236
236
|
```
|
237
237
|
|
238
|
+
## This resource supports User Project Overrides.
|
239
|
+
|
240
|
+
-
|
241
|
+
|
242
|
+
# IAM policy for Identity-Aware Proxy Web
|
243
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Web. Each of these resources serves a different use case:
|
244
|
+
|
245
|
+
* `iap.WebIamPolicy`: Authoritative. Sets the IAM policy for the web and replaces any existing policy already attached.
|
246
|
+
* `iap.WebIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the web are preserved.
|
247
|
+
* `iap.WebIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the web are preserved.
|
248
|
+
|
249
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
250
|
+
|
251
|
+
* `iap.WebIamPolicy`: Retrieves the IAM policy for the web
|
252
|
+
|
253
|
+
> **Note:** `iap.WebIamPolicy` **cannot** be used in conjunction with `iap.WebIamBinding` and `iap.WebIamMember` or they will fight over what your policy should be.
|
254
|
+
|
255
|
+
> **Note:** `iap.WebIamBinding` resources **can be** used in conjunction with `iap.WebIamMember` resources **only if** they do not grant privilege to the same role.
|
256
|
+
|
257
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
258
|
+
|
238
259
|
## iap.WebIamPolicy
|
239
260
|
|
240
261
|
```python
|
@@ -481,6 +502,27 @@ class WebIamPolicy(pulumi.CustomResource):
|
|
481
502
|
})
|
482
503
|
```
|
483
504
|
|
505
|
+
## This resource supports User Project Overrides.
|
506
|
+
|
507
|
+
-
|
508
|
+
|
509
|
+
# IAM policy for Identity-Aware Proxy Web
|
510
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Web. Each of these resources serves a different use case:
|
511
|
+
|
512
|
+
* `iap.WebIamPolicy`: Authoritative. Sets the IAM policy for the web and replaces any existing policy already attached.
|
513
|
+
* `iap.WebIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the web are preserved.
|
514
|
+
* `iap.WebIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the web are preserved.
|
515
|
+
|
516
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
517
|
+
|
518
|
+
* `iap.WebIamPolicy`: Retrieves the IAM policy for the web
|
519
|
+
|
520
|
+
> **Note:** `iap.WebIamPolicy` **cannot** be used in conjunction with `iap.WebIamBinding` and `iap.WebIamMember` or they will fight over what your policy should be.
|
521
|
+
|
522
|
+
> **Note:** `iap.WebIamBinding` resources **can be** used in conjunction with `iap.WebIamMember` resources **only if** they do not grant privilege to the same role.
|
523
|
+
|
524
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
525
|
+
|
484
526
|
## iap.WebIamPolicy
|
485
527
|
|
486
528
|
```python
|
@@ -419,6 +419,27 @@ class WebRegionBackendServiceIamBinding(pulumi.CustomResource):
|
|
419
419
|
})
|
420
420
|
```
|
421
421
|
|
422
|
+
## This resource supports User Project Overrides.
|
423
|
+
|
424
|
+
-
|
425
|
+
|
426
|
+
# IAM policy for Identity-Aware Proxy WebRegionBackendService
|
427
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebRegionBackendService. Each of these resources serves a different use case:
|
428
|
+
|
429
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webregionbackendservice and replaces any existing policy already attached.
|
430
|
+
* `iap.WebRegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webregionbackendservice are preserved.
|
431
|
+
* `iap.WebRegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webregionbackendservice are preserved.
|
432
|
+
|
433
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
434
|
+
|
435
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Retrieves the IAM policy for the webregionbackendservice
|
436
|
+
|
437
|
+
> **Note:** `iap.WebRegionBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebRegionBackendServiceIamBinding` and `iap.WebRegionBackendServiceIamMember` or they will fight over what your policy should be.
|
438
|
+
|
439
|
+
> **Note:** `iap.WebRegionBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebRegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
440
|
+
|
441
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
442
|
+
|
422
443
|
## iap.WebRegionBackendServiceIamPolicy
|
423
444
|
|
424
445
|
```python
|
@@ -708,6 +729,27 @@ class WebRegionBackendServiceIamBinding(pulumi.CustomResource):
|
|
708
729
|
})
|
709
730
|
```
|
710
731
|
|
732
|
+
## This resource supports User Project Overrides.
|
733
|
+
|
734
|
+
-
|
735
|
+
|
736
|
+
# IAM policy for Identity-Aware Proxy WebRegionBackendService
|
737
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebRegionBackendService. Each of these resources serves a different use case:
|
738
|
+
|
739
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webregionbackendservice and replaces any existing policy already attached.
|
740
|
+
* `iap.WebRegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webregionbackendservice are preserved.
|
741
|
+
* `iap.WebRegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webregionbackendservice are preserved.
|
742
|
+
|
743
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
744
|
+
|
745
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Retrieves the IAM policy for the webregionbackendservice
|
746
|
+
|
747
|
+
> **Note:** `iap.WebRegionBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebRegionBackendServiceIamBinding` and `iap.WebRegionBackendServiceIamMember` or they will fight over what your policy should be.
|
748
|
+
|
749
|
+
> **Note:** `iap.WebRegionBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebRegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
750
|
+
|
751
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
752
|
+
|
711
753
|
## iap.WebRegionBackendServiceIamPolicy
|
712
754
|
|
713
755
|
```python
|
@@ -419,6 +419,27 @@ class WebRegionBackendServiceIamMember(pulumi.CustomResource):
|
|
419
419
|
})
|
420
420
|
```
|
421
421
|
|
422
|
+
## This resource supports User Project Overrides.
|
423
|
+
|
424
|
+
-
|
425
|
+
|
426
|
+
# IAM policy for Identity-Aware Proxy WebRegionBackendService
|
427
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebRegionBackendService. Each of these resources serves a different use case:
|
428
|
+
|
429
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webregionbackendservice and replaces any existing policy already attached.
|
430
|
+
* `iap.WebRegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webregionbackendservice are preserved.
|
431
|
+
* `iap.WebRegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webregionbackendservice are preserved.
|
432
|
+
|
433
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
434
|
+
|
435
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Retrieves the IAM policy for the webregionbackendservice
|
436
|
+
|
437
|
+
> **Note:** `iap.WebRegionBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebRegionBackendServiceIamBinding` and `iap.WebRegionBackendServiceIamMember` or they will fight over what your policy should be.
|
438
|
+
|
439
|
+
> **Note:** `iap.WebRegionBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebRegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
440
|
+
|
441
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
442
|
+
|
422
443
|
## iap.WebRegionBackendServiceIamPolicy
|
423
444
|
|
424
445
|
```python
|
@@ -708,6 +729,27 @@ class WebRegionBackendServiceIamMember(pulumi.CustomResource):
|
|
708
729
|
})
|
709
730
|
```
|
710
731
|
|
732
|
+
## This resource supports User Project Overrides.
|
733
|
+
|
734
|
+
-
|
735
|
+
|
736
|
+
# IAM policy for Identity-Aware Proxy WebRegionBackendService
|
737
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebRegionBackendService. Each of these resources serves a different use case:
|
738
|
+
|
739
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webregionbackendservice and replaces any existing policy already attached.
|
740
|
+
* `iap.WebRegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webregionbackendservice are preserved.
|
741
|
+
* `iap.WebRegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webregionbackendservice are preserved.
|
742
|
+
|
743
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
744
|
+
|
745
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Retrieves the IAM policy for the webregionbackendservice
|
746
|
+
|
747
|
+
> **Note:** `iap.WebRegionBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebRegionBackendServiceIamBinding` and `iap.WebRegionBackendServiceIamMember` or they will fight over what your policy should be.
|
748
|
+
|
749
|
+
> **Note:** `iap.WebRegionBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebRegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
750
|
+
|
751
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
752
|
+
|
711
753
|
## iap.WebRegionBackendServiceIamPolicy
|
712
754
|
|
713
755
|
```python
|
@@ -304,6 +304,27 @@ class WebRegionBackendServiceIamPolicy(pulumi.CustomResource):
|
|
304
304
|
})
|
305
305
|
```
|
306
306
|
|
307
|
+
## This resource supports User Project Overrides.
|
308
|
+
|
309
|
+
-
|
310
|
+
|
311
|
+
# IAM policy for Identity-Aware Proxy WebRegionBackendService
|
312
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebRegionBackendService. Each of these resources serves a different use case:
|
313
|
+
|
314
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webregionbackendservice and replaces any existing policy already attached.
|
315
|
+
* `iap.WebRegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webregionbackendservice are preserved.
|
316
|
+
* `iap.WebRegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webregionbackendservice are preserved.
|
317
|
+
|
318
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
319
|
+
|
320
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Retrieves the IAM policy for the webregionbackendservice
|
321
|
+
|
322
|
+
> **Note:** `iap.WebRegionBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebRegionBackendServiceIamBinding` and `iap.WebRegionBackendServiceIamMember` or they will fight over what your policy should be.
|
323
|
+
|
324
|
+
> **Note:** `iap.WebRegionBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebRegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
325
|
+
|
326
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
327
|
+
|
307
328
|
## iap.WebRegionBackendServiceIamPolicy
|
308
329
|
|
309
330
|
```python
|
@@ -579,6 +600,27 @@ class WebRegionBackendServiceIamPolicy(pulumi.CustomResource):
|
|
579
600
|
})
|
580
601
|
```
|
581
602
|
|
603
|
+
## This resource supports User Project Overrides.
|
604
|
+
|
605
|
+
-
|
606
|
+
|
607
|
+
# IAM policy for Identity-Aware Proxy WebRegionBackendService
|
608
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebRegionBackendService. Each of these resources serves a different use case:
|
609
|
+
|
610
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the webregionbackendservice and replaces any existing policy already attached.
|
611
|
+
* `iap.WebRegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webregionbackendservice are preserved.
|
612
|
+
* `iap.WebRegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webregionbackendservice are preserved.
|
613
|
+
|
614
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
615
|
+
|
616
|
+
* `iap.WebRegionBackendServiceIamPolicy`: Retrieves the IAM policy for the webregionbackendservice
|
617
|
+
|
618
|
+
> **Note:** `iap.WebRegionBackendServiceIamPolicy` **cannot** be used in conjunction with `iap.WebRegionBackendServiceIamBinding` and `iap.WebRegionBackendServiceIamMember` or they will fight over what your policy should be.
|
619
|
+
|
620
|
+
> **Note:** `iap.WebRegionBackendServiceIamBinding` resources **can be** used in conjunction with `iap.WebRegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
621
|
+
|
622
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
623
|
+
|
582
624
|
## iap.WebRegionBackendServiceIamPolicy
|
583
625
|
|
584
626
|
```python
|
@@ -388,6 +388,27 @@ class WebTypeAppEngingIamBinding(pulumi.CustomResource):
|
|
388
388
|
})
|
389
389
|
```
|
390
390
|
|
391
|
+
## This resource supports User Project Overrides.
|
392
|
+
|
393
|
+
-
|
394
|
+
|
395
|
+
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
396
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
397
|
+
|
398
|
+
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
399
|
+
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
400
|
+
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
401
|
+
|
402
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
+
|
404
|
+
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
405
|
+
|
406
|
+
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
407
|
+
|
408
|
+
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
+
|
410
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
411
|
+
|
391
412
|
## iap.WebTypeAppEngingIamPolicy
|
392
413
|
|
393
414
|
```python
|
@@ -663,6 +684,27 @@ class WebTypeAppEngingIamBinding(pulumi.CustomResource):
|
|
663
684
|
})
|
664
685
|
```
|
665
686
|
|
687
|
+
## This resource supports User Project Overrides.
|
688
|
+
|
689
|
+
-
|
690
|
+
|
691
|
+
# IAM policy for Identity-Aware Proxy WebTypeAppEngine
|
692
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
|
693
|
+
|
694
|
+
* `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
|
695
|
+
* `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
|
696
|
+
* `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
|
697
|
+
|
698
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
699
|
+
|
700
|
+
* `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
|
701
|
+
|
702
|
+
> **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
|
703
|
+
|
704
|
+
> **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
|
705
|
+
|
706
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
707
|
+
|
666
708
|
## iap.WebTypeAppEngingIamPolicy
|
667
709
|
|
668
710
|
```python
|