pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -407,43 +407,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
|
|
407
407
|
})
|
408
408
|
```
|
409
409
|
|
410
|
-
## spanner.DatabaseIAMPolicy
|
411
|
-
|
412
|
-
```python
|
413
|
-
import pulumi
|
414
|
-
import pulumi_gcp as gcp
|
415
|
-
|
416
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
417
|
-
"role": "roles/editor",
|
418
|
-
"members": ["user:jane@example.com"],
|
419
|
-
}])
|
420
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
421
|
-
instance="your-instance-name",
|
422
|
-
database="your-database-name",
|
423
|
-
policy_data=admin.policy_data)
|
424
|
-
```
|
425
|
-
|
426
|
-
With IAM Conditions:
|
427
|
-
|
428
|
-
```python
|
429
|
-
import pulumi
|
430
|
-
import pulumi_gcp as gcp
|
431
|
-
|
432
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
433
|
-
"role": "roles/editor",
|
434
|
-
"members": ["user:jane@example.com"],
|
435
|
-
"condition": {
|
436
|
-
"title": "My Role",
|
437
|
-
"description": "Grant permissions on my_role",
|
438
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
439
|
-
},
|
440
|
-
}])
|
441
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
442
|
-
instance="your-instance-name",
|
443
|
-
database="your-database-name",
|
444
|
-
policy_data=admin.policy_data)
|
445
|
-
```
|
446
|
-
|
447
410
|
## spanner.DatabaseIAMBinding
|
448
411
|
|
449
412
|
```python
|
@@ -671,43 +634,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
|
|
671
634
|
})
|
672
635
|
```
|
673
636
|
|
674
|
-
## spanner.DatabaseIAMPolicy
|
675
|
-
|
676
|
-
```python
|
677
|
-
import pulumi
|
678
|
-
import pulumi_gcp as gcp
|
679
|
-
|
680
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
681
|
-
"role": "roles/editor",
|
682
|
-
"members": ["user:jane@example.com"],
|
683
|
-
}])
|
684
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
685
|
-
instance="your-instance-name",
|
686
|
-
database="your-database-name",
|
687
|
-
policy_data=admin.policy_data)
|
688
|
-
```
|
689
|
-
|
690
|
-
With IAM Conditions:
|
691
|
-
|
692
|
-
```python
|
693
|
-
import pulumi
|
694
|
-
import pulumi_gcp as gcp
|
695
|
-
|
696
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
697
|
-
"role": "roles/editor",
|
698
|
-
"members": ["user:jane@example.com"],
|
699
|
-
"condition": {
|
700
|
-
"title": "My Role",
|
701
|
-
"description": "Grant permissions on my_role",
|
702
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
703
|
-
},
|
704
|
-
}])
|
705
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
706
|
-
instance="your-instance-name",
|
707
|
-
database="your-database-name",
|
708
|
-
policy_data=admin.policy_data)
|
709
|
-
```
|
710
|
-
|
711
637
|
## spanner.DatabaseIAMBinding
|
712
638
|
|
713
639
|
```python
|
@@ -304,43 +304,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
|
|
304
304
|
})
|
305
305
|
```
|
306
306
|
|
307
|
-
## spanner.DatabaseIAMPolicy
|
308
|
-
|
309
|
-
```python
|
310
|
-
import pulumi
|
311
|
-
import pulumi_gcp as gcp
|
312
|
-
|
313
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
314
|
-
"role": "roles/editor",
|
315
|
-
"members": ["user:jane@example.com"],
|
316
|
-
}])
|
317
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
318
|
-
instance="your-instance-name",
|
319
|
-
database="your-database-name",
|
320
|
-
policy_data=admin.policy_data)
|
321
|
-
```
|
322
|
-
|
323
|
-
With IAM Conditions:
|
324
|
-
|
325
|
-
```python
|
326
|
-
import pulumi
|
327
|
-
import pulumi_gcp as gcp
|
328
|
-
|
329
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
330
|
-
"role": "roles/editor",
|
331
|
-
"members": ["user:jane@example.com"],
|
332
|
-
"condition": {
|
333
|
-
"title": "My Role",
|
334
|
-
"description": "Grant permissions on my_role",
|
335
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
336
|
-
},
|
337
|
-
}])
|
338
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
339
|
-
instance="your-instance-name",
|
340
|
-
database="your-database-name",
|
341
|
-
policy_data=admin.policy_data)
|
342
|
-
```
|
343
|
-
|
344
307
|
## spanner.DatabaseIAMBinding
|
345
308
|
|
346
309
|
```python
|
@@ -557,43 +520,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
|
|
557
520
|
})
|
558
521
|
```
|
559
522
|
|
560
|
-
## spanner.DatabaseIAMPolicy
|
561
|
-
|
562
|
-
```python
|
563
|
-
import pulumi
|
564
|
-
import pulumi_gcp as gcp
|
565
|
-
|
566
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
567
|
-
"role": "roles/editor",
|
568
|
-
"members": ["user:jane@example.com"],
|
569
|
-
}])
|
570
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
571
|
-
instance="your-instance-name",
|
572
|
-
database="your-database-name",
|
573
|
-
policy_data=admin.policy_data)
|
574
|
-
```
|
575
|
-
|
576
|
-
With IAM Conditions:
|
577
|
-
|
578
|
-
```python
|
579
|
-
import pulumi
|
580
|
-
import pulumi_gcp as gcp
|
581
|
-
|
582
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
583
|
-
"role": "roles/editor",
|
584
|
-
"members": ["user:jane@example.com"],
|
585
|
-
"condition": {
|
586
|
-
"title": "My Role",
|
587
|
-
"description": "Grant permissions on my_role",
|
588
|
-
"expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
|
589
|
-
},
|
590
|
-
}])
|
591
|
-
database = gcp.spanner.DatabaseIAMPolicy("database",
|
592
|
-
instance="your-instance-name",
|
593
|
-
database="your-database-name",
|
594
|
-
policy_data=admin.policy_data)
|
595
|
-
```
|
596
|
-
|
597
523
|
## spanner.DatabaseIAMBinding
|
598
524
|
|
599
525
|
```python
|
@@ -303,21 +303,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
303
303
|
member="user:jane@example.com")
|
304
304
|
```
|
305
305
|
|
306
|
-
## spanner.InstanceIAMPolicy
|
307
|
-
|
308
|
-
```python
|
309
|
-
import pulumi
|
310
|
-
import pulumi_gcp as gcp
|
311
|
-
|
312
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
313
|
-
"role": "roles/editor",
|
314
|
-
"members": ["user:jane@example.com"],
|
315
|
-
}])
|
316
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
317
|
-
instance="your-instance-name",
|
318
|
-
policy_data=admin.policy_data)
|
319
|
-
```
|
320
|
-
|
321
306
|
## spanner.InstanceIAMBinding
|
322
307
|
|
323
308
|
```python
|
@@ -444,21 +429,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
|
|
444
429
|
member="user:jane@example.com")
|
445
430
|
```
|
446
431
|
|
447
|
-
## spanner.InstanceIAMPolicy
|
448
|
-
|
449
|
-
```python
|
450
|
-
import pulumi
|
451
|
-
import pulumi_gcp as gcp
|
452
|
-
|
453
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
454
|
-
"role": "roles/editor",
|
455
|
-
"members": ["user:jane@example.com"],
|
456
|
-
}])
|
457
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
458
|
-
instance="your-instance-name",
|
459
|
-
policy_data=admin.policy_data)
|
460
|
-
```
|
461
|
-
|
462
432
|
## spanner.InstanceIAMBinding
|
463
433
|
|
464
434
|
```python
|
@@ -303,21 +303,6 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
303
303
|
member="user:jane@example.com")
|
304
304
|
```
|
305
305
|
|
306
|
-
## spanner.InstanceIAMPolicy
|
307
|
-
|
308
|
-
```python
|
309
|
-
import pulumi
|
310
|
-
import pulumi_gcp as gcp
|
311
|
-
|
312
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
313
|
-
"role": "roles/editor",
|
314
|
-
"members": ["user:jane@example.com"],
|
315
|
-
}])
|
316
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
317
|
-
instance="your-instance-name",
|
318
|
-
policy_data=admin.policy_data)
|
319
|
-
```
|
320
|
-
|
321
306
|
## spanner.InstanceIAMBinding
|
322
307
|
|
323
308
|
```python
|
@@ -444,21 +429,6 @@ class InstanceIAMMember(pulumi.CustomResource):
|
|
444
429
|
member="user:jane@example.com")
|
445
430
|
```
|
446
431
|
|
447
|
-
## spanner.InstanceIAMPolicy
|
448
|
-
|
449
|
-
```python
|
450
|
-
import pulumi
|
451
|
-
import pulumi_gcp as gcp
|
452
|
-
|
453
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
454
|
-
"role": "roles/editor",
|
455
|
-
"members": ["user:jane@example.com"],
|
456
|
-
}])
|
457
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
458
|
-
instance="your-instance-name",
|
459
|
-
policy_data=admin.policy_data)
|
460
|
-
```
|
461
|
-
|
462
432
|
## spanner.InstanceIAMBinding
|
463
433
|
|
464
434
|
```python
|
@@ -212,21 +212,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
212
212
|
member="user:jane@example.com")
|
213
213
|
```
|
214
214
|
|
215
|
-
## spanner.InstanceIAMPolicy
|
216
|
-
|
217
|
-
```python
|
218
|
-
import pulumi
|
219
|
-
import pulumi_gcp as gcp
|
220
|
-
|
221
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
222
|
-
"role": "roles/editor",
|
223
|
-
"members": ["user:jane@example.com"],
|
224
|
-
}])
|
225
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
226
|
-
instance="your-instance-name",
|
227
|
-
policy_data=admin.policy_data)
|
228
|
-
```
|
229
|
-
|
230
215
|
## spanner.InstanceIAMBinding
|
231
216
|
|
232
217
|
```python
|
@@ -344,21 +329,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
|
|
344
329
|
member="user:jane@example.com")
|
345
330
|
```
|
346
331
|
|
347
|
-
## spanner.InstanceIAMPolicy
|
348
|
-
|
349
|
-
```python
|
350
|
-
import pulumi
|
351
|
-
import pulumi_gcp as gcp
|
352
|
-
|
353
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
354
|
-
"role": "roles/editor",
|
355
|
-
"members": ["user:jane@example.com"],
|
356
|
-
}])
|
357
|
-
instance = gcp.spanner.InstanceIAMPolicy("instance",
|
358
|
-
instance="your-instance-name",
|
359
|
-
policy_data=admin.policy_data)
|
360
|
-
```
|
361
|
-
|
362
332
|
## spanner.InstanceIAMBinding
|
363
333
|
|
364
334
|
```python
|
@@ -345,6 +345,27 @@ class BucketIAMBinding(pulumi.CustomResource):
|
|
345
345
|
})
|
346
346
|
```
|
347
347
|
|
348
|
+
## This resource supports User Project Overrides.
|
349
|
+
|
350
|
+
-
|
351
|
+
|
352
|
+
# IAM policy for Cloud Storage Bucket
|
353
|
+
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
354
|
+
|
355
|
+
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
356
|
+
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
357
|
+
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
358
|
+
|
359
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
360
|
+
|
361
|
+
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
362
|
+
|
363
|
+
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
364
|
+
|
365
|
+
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
366
|
+
|
367
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
368
|
+
|
348
369
|
## storage.BucketIAMPolicy
|
349
370
|
|
350
371
|
```python
|
@@ -604,6 +625,27 @@ class BucketIAMBinding(pulumi.CustomResource):
|
|
604
625
|
})
|
605
626
|
```
|
606
627
|
|
628
|
+
## This resource supports User Project Overrides.
|
629
|
+
|
630
|
+
-
|
631
|
+
|
632
|
+
# IAM policy for Cloud Storage Bucket
|
633
|
+
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
634
|
+
|
635
|
+
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
636
|
+
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
637
|
+
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
638
|
+
|
639
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
640
|
+
|
641
|
+
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
642
|
+
|
643
|
+
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
644
|
+
|
645
|
+
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
646
|
+
|
647
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
648
|
+
|
607
649
|
## storage.BucketIAMPolicy
|
608
650
|
|
609
651
|
```python
|
@@ -345,6 +345,27 @@ class BucketIAMMember(pulumi.CustomResource):
|
|
345
345
|
})
|
346
346
|
```
|
347
347
|
|
348
|
+
## This resource supports User Project Overrides.
|
349
|
+
|
350
|
+
-
|
351
|
+
|
352
|
+
# IAM policy for Cloud Storage Bucket
|
353
|
+
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
354
|
+
|
355
|
+
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
356
|
+
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
357
|
+
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
358
|
+
|
359
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
360
|
+
|
361
|
+
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
362
|
+
|
363
|
+
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
364
|
+
|
365
|
+
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
366
|
+
|
367
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
368
|
+
|
348
369
|
## storage.BucketIAMPolicy
|
349
370
|
|
350
371
|
```python
|
@@ -604,6 +625,27 @@ class BucketIAMMember(pulumi.CustomResource):
|
|
604
625
|
})
|
605
626
|
```
|
606
627
|
|
628
|
+
## This resource supports User Project Overrides.
|
629
|
+
|
630
|
+
-
|
631
|
+
|
632
|
+
# IAM policy for Cloud Storage Bucket
|
633
|
+
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
634
|
+
|
635
|
+
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
636
|
+
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
637
|
+
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
638
|
+
|
639
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
640
|
+
|
641
|
+
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
642
|
+
|
643
|
+
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
644
|
+
|
645
|
+
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
646
|
+
|
647
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
648
|
+
|
607
649
|
## storage.BucketIAMPolicy
|
608
650
|
|
609
651
|
```python
|
@@ -230,6 +230,27 @@ class BucketIAMPolicy(pulumi.CustomResource):
|
|
230
230
|
})
|
231
231
|
```
|
232
232
|
|
233
|
+
## This resource supports User Project Overrides.
|
234
|
+
|
235
|
+
-
|
236
|
+
|
237
|
+
# IAM policy for Cloud Storage Bucket
|
238
|
+
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
239
|
+
|
240
|
+
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
241
|
+
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
242
|
+
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
243
|
+
|
244
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
245
|
+
|
246
|
+
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
247
|
+
|
248
|
+
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
249
|
+
|
250
|
+
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
251
|
+
|
252
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
253
|
+
|
233
254
|
## storage.BucketIAMPolicy
|
234
255
|
|
235
256
|
```python
|
@@ -475,6 +496,27 @@ class BucketIAMPolicy(pulumi.CustomResource):
|
|
475
496
|
})
|
476
497
|
```
|
477
498
|
|
499
|
+
## This resource supports User Project Overrides.
|
500
|
+
|
501
|
+
-
|
502
|
+
|
503
|
+
# IAM policy for Cloud Storage Bucket
|
504
|
+
Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
|
505
|
+
|
506
|
+
* `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
|
507
|
+
* `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
|
508
|
+
* `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
|
509
|
+
|
510
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
511
|
+
|
512
|
+
* `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
|
513
|
+
|
514
|
+
> **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
|
515
|
+
|
516
|
+
> **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
|
517
|
+
|
518
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
519
|
+
|
478
520
|
## storage.BucketIAMPolicy
|
479
521
|
|
480
522
|
```python
|
@@ -383,6 +383,28 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
|
|
383
383
|
})
|
384
384
|
```
|
385
385
|
|
386
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
387
|
+
|
388
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
389
|
+
---
|
390
|
+
|
391
|
+
# IAM policy for Cloud Storage ManagedFolder
|
392
|
+
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
395
|
+
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
396
|
+
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
401
|
+
|
402
|
+
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
406
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
407
|
+
|
386
408
|
## storage.ManagedFolderIamPolicy
|
387
409
|
|
388
410
|
```python
|
@@ -655,6 +677,28 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
|
|
655
677
|
})
|
656
678
|
```
|
657
679
|
|
680
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
681
|
+
|
682
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
683
|
+
---
|
684
|
+
|
685
|
+
# IAM policy for Cloud Storage ManagedFolder
|
686
|
+
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
687
|
+
|
688
|
+
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
689
|
+
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
690
|
+
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
691
|
+
|
692
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
693
|
+
|
694
|
+
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
695
|
+
|
696
|
+
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
697
|
+
|
698
|
+
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
699
|
+
|
700
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
701
|
+
|
658
702
|
## storage.ManagedFolderIamPolicy
|
659
703
|
|
660
704
|
```python
|
@@ -383,6 +383,28 @@ class ManagedFolderIamMember(pulumi.CustomResource):
|
|
383
383
|
})
|
384
384
|
```
|
385
385
|
|
386
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
387
|
+
|
388
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
389
|
+
---
|
390
|
+
|
391
|
+
# IAM policy for Cloud Storage ManagedFolder
|
392
|
+
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
395
|
+
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
396
|
+
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
401
|
+
|
402
|
+
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
406
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
407
|
+
|
386
408
|
## storage.ManagedFolderIamPolicy
|
387
409
|
|
388
410
|
```python
|
@@ -655,6 +677,28 @@ class ManagedFolderIamMember(pulumi.CustomResource):
|
|
655
677
|
})
|
656
678
|
```
|
657
679
|
|
680
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
681
|
+
|
682
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
683
|
+
---
|
684
|
+
|
685
|
+
# IAM policy for Cloud Storage ManagedFolder
|
686
|
+
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
687
|
+
|
688
|
+
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
689
|
+
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
690
|
+
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
691
|
+
|
692
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
693
|
+
|
694
|
+
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
695
|
+
|
696
|
+
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
697
|
+
|
698
|
+
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
699
|
+
|
700
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
701
|
+
|
658
702
|
## storage.ManagedFolderIamPolicy
|
659
703
|
|
660
704
|
```python
|
@@ -268,6 +268,28 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
|
|
268
268
|
})
|
269
269
|
```
|
270
270
|
|
271
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
272
|
+
|
273
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
274
|
+
---
|
275
|
+
|
276
|
+
# IAM policy for Cloud Storage ManagedFolder
|
277
|
+
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
278
|
+
|
279
|
+
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
280
|
+
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
281
|
+
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
282
|
+
|
283
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
284
|
+
|
285
|
+
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
286
|
+
|
287
|
+
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
288
|
+
|
289
|
+
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
290
|
+
|
291
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
292
|
+
|
271
293
|
## storage.ManagedFolderIamPolicy
|
272
294
|
|
273
295
|
```python
|
@@ -526,6 +548,28 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
|
|
526
548
|
})
|
527
549
|
```
|
528
550
|
|
551
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
552
|
+
|
553
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
554
|
+
---
|
555
|
+
|
556
|
+
# IAM policy for Cloud Storage ManagedFolder
|
557
|
+
Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
|
558
|
+
|
559
|
+
* `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
|
560
|
+
* `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
|
561
|
+
* `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
|
562
|
+
|
563
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
564
|
+
|
565
|
+
* `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
|
566
|
+
|
567
|
+
> **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
|
568
|
+
|
569
|
+
> **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
|
570
|
+
|
571
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
572
|
+
|
529
573
|
## storage.ManagedFolderIamPolicy
|
530
574
|
|
531
575
|
```python
|