pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723631483__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/top_level.txt +0 -0
@@ -464,6 +464,27 @@ class AppEngineVersionIamBinding(pulumi.CustomResource):
|
|
464
464
|
})
|
465
465
|
```
|
466
466
|
|
467
|
+
## This resource supports User Project Overrides.
|
468
|
+
|
469
|
+
-
|
470
|
+
|
471
|
+
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
472
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
473
|
+
|
474
|
+
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
475
|
+
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
476
|
+
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
477
|
+
|
478
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
479
|
+
|
480
|
+
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
481
|
+
|
482
|
+
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
483
|
+
|
484
|
+
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
485
|
+
|
486
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
487
|
+
|
467
488
|
## iap.AppEngineVersionIamPolicy
|
468
489
|
|
469
490
|
```python
|
@@ -767,6 +788,27 @@ class AppEngineVersionIamBinding(pulumi.CustomResource):
|
|
767
788
|
})
|
768
789
|
```
|
769
790
|
|
791
|
+
## This resource supports User Project Overrides.
|
792
|
+
|
793
|
+
-
|
794
|
+
|
795
|
+
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
796
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
797
|
+
|
798
|
+
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
799
|
+
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
800
|
+
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
801
|
+
|
802
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
803
|
+
|
804
|
+
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
805
|
+
|
806
|
+
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
807
|
+
|
808
|
+
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
809
|
+
|
810
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
811
|
+
|
770
812
|
## iap.AppEngineVersionIamPolicy
|
771
813
|
|
772
814
|
```python
|
@@ -464,6 +464,27 @@ class AppEngineVersionIamMember(pulumi.CustomResource):
|
|
464
464
|
})
|
465
465
|
```
|
466
466
|
|
467
|
+
## This resource supports User Project Overrides.
|
468
|
+
|
469
|
+
-
|
470
|
+
|
471
|
+
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
472
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
473
|
+
|
474
|
+
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
475
|
+
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
476
|
+
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
477
|
+
|
478
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
479
|
+
|
480
|
+
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
481
|
+
|
482
|
+
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
483
|
+
|
484
|
+
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
485
|
+
|
486
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
487
|
+
|
467
488
|
## iap.AppEngineVersionIamPolicy
|
468
489
|
|
469
490
|
```python
|
@@ -767,6 +788,27 @@ class AppEngineVersionIamMember(pulumi.CustomResource):
|
|
767
788
|
})
|
768
789
|
```
|
769
790
|
|
791
|
+
## This resource supports User Project Overrides.
|
792
|
+
|
793
|
+
-
|
794
|
+
|
795
|
+
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
796
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
797
|
+
|
798
|
+
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
799
|
+
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
800
|
+
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
801
|
+
|
802
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
803
|
+
|
804
|
+
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
805
|
+
|
806
|
+
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
807
|
+
|
808
|
+
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
809
|
+
|
810
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
811
|
+
|
770
812
|
## iap.AppEngineVersionIamPolicy
|
771
813
|
|
772
814
|
```python
|
@@ -349,6 +349,27 @@ class AppEngineVersionIamPolicy(pulumi.CustomResource):
|
|
349
349
|
})
|
350
350
|
```
|
351
351
|
|
352
|
+
## This resource supports User Project Overrides.
|
353
|
+
|
354
|
+
-
|
355
|
+
|
356
|
+
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
357
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
358
|
+
|
359
|
+
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
360
|
+
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
361
|
+
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
362
|
+
|
363
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
364
|
+
|
365
|
+
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
366
|
+
|
367
|
+
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
368
|
+
|
369
|
+
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
370
|
+
|
371
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
372
|
+
|
352
373
|
## iap.AppEngineVersionIamPolicy
|
353
374
|
|
354
375
|
```python
|
@@ -638,6 +659,27 @@ class AppEngineVersionIamPolicy(pulumi.CustomResource):
|
|
638
659
|
})
|
639
660
|
```
|
640
661
|
|
662
|
+
## This resource supports User Project Overrides.
|
663
|
+
|
664
|
+
-
|
665
|
+
|
666
|
+
# IAM policy for Identity-Aware Proxy AppEngineVersion
|
667
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
|
668
|
+
|
669
|
+
* `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
|
670
|
+
* `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
|
671
|
+
* `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
|
672
|
+
|
673
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
674
|
+
|
675
|
+
* `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
|
676
|
+
|
677
|
+
> **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
|
678
|
+
|
679
|
+
> **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
|
680
|
+
|
681
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
682
|
+
|
641
683
|
## iap.AppEngineVersionIamPolicy
|
642
684
|
|
643
685
|
```python
|
@@ -431,6 +431,27 @@ class TunnelDestGroupIamBinding(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
+
## This resource supports User Project Overrides.
|
435
|
+
|
436
|
+
-
|
437
|
+
|
438
|
+
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
439
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
440
|
+
|
441
|
+
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
442
|
+
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
443
|
+
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
444
|
+
|
445
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
+
|
447
|
+
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
448
|
+
|
449
|
+
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
450
|
+
|
451
|
+
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
+
|
453
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
+
|
434
455
|
## iap.TunnelDestGroupIamPolicy
|
435
456
|
|
436
457
|
```python
|
@@ -725,6 +746,27 @@ class TunnelDestGroupIamBinding(pulumi.CustomResource):
|
|
725
746
|
})
|
726
747
|
```
|
727
748
|
|
749
|
+
## This resource supports User Project Overrides.
|
750
|
+
|
751
|
+
-
|
752
|
+
|
753
|
+
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
754
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
755
|
+
|
756
|
+
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
757
|
+
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
758
|
+
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
759
|
+
|
760
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
761
|
+
|
762
|
+
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
763
|
+
|
764
|
+
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
765
|
+
|
766
|
+
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
767
|
+
|
768
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
769
|
+
|
728
770
|
## iap.TunnelDestGroupIamPolicy
|
729
771
|
|
730
772
|
```python
|
@@ -431,6 +431,27 @@ class TunnelDestGroupIamMember(pulumi.CustomResource):
|
|
431
431
|
})
|
432
432
|
```
|
433
433
|
|
434
|
+
## This resource supports User Project Overrides.
|
435
|
+
|
436
|
+
-
|
437
|
+
|
438
|
+
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
439
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
440
|
+
|
441
|
+
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
442
|
+
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
443
|
+
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
444
|
+
|
445
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
446
|
+
|
447
|
+
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
448
|
+
|
449
|
+
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
450
|
+
|
451
|
+
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
452
|
+
|
453
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
454
|
+
|
434
455
|
## iap.TunnelDestGroupIamPolicy
|
435
456
|
|
436
457
|
```python
|
@@ -725,6 +746,27 @@ class TunnelDestGroupIamMember(pulumi.CustomResource):
|
|
725
746
|
})
|
726
747
|
```
|
727
748
|
|
749
|
+
## This resource supports User Project Overrides.
|
750
|
+
|
751
|
+
-
|
752
|
+
|
753
|
+
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
754
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
755
|
+
|
756
|
+
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
757
|
+
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
758
|
+
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
759
|
+
|
760
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
761
|
+
|
762
|
+
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
763
|
+
|
764
|
+
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
765
|
+
|
766
|
+
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
767
|
+
|
768
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
769
|
+
|
728
770
|
## iap.TunnelDestGroupIamPolicy
|
729
771
|
|
730
772
|
```python
|
@@ -316,6 +316,27 @@ class TunnelDestGroupIamPolicy(pulumi.CustomResource):
|
|
316
316
|
})
|
317
317
|
```
|
318
318
|
|
319
|
+
## This resource supports User Project Overrides.
|
320
|
+
|
321
|
+
-
|
322
|
+
|
323
|
+
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
324
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
325
|
+
|
326
|
+
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
327
|
+
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
328
|
+
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
329
|
+
|
330
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
331
|
+
|
332
|
+
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
333
|
+
|
334
|
+
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
335
|
+
|
336
|
+
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
337
|
+
|
338
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
339
|
+
|
319
340
|
## iap.TunnelDestGroupIamPolicy
|
320
341
|
|
321
342
|
```python
|
@@ -596,6 +617,27 @@ class TunnelDestGroupIamPolicy(pulumi.CustomResource):
|
|
596
617
|
})
|
597
618
|
```
|
598
619
|
|
620
|
+
## This resource supports User Project Overrides.
|
621
|
+
|
622
|
+
-
|
623
|
+
|
624
|
+
# IAM policy for Identity-Aware Proxy TunnelDestGroup
|
625
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
|
626
|
+
|
627
|
+
* `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
|
628
|
+
* `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
|
629
|
+
* `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
|
630
|
+
|
631
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
632
|
+
|
633
|
+
* `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
|
634
|
+
|
635
|
+
> **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
|
636
|
+
|
637
|
+
> **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
638
|
+
|
639
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
640
|
+
|
599
641
|
## iap.TunnelDestGroupIamPolicy
|
600
642
|
|
601
643
|
```python
|
@@ -350,6 +350,27 @@ class TunnelIamBinding(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
+
## This resource supports User Project Overrides.
|
354
|
+
|
355
|
+
-
|
356
|
+
|
357
|
+
# IAM policy for Identity-Aware Proxy Tunnel
|
358
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
359
|
+
|
360
|
+
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
361
|
+
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
362
|
+
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
363
|
+
|
364
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
+
|
366
|
+
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
367
|
+
|
368
|
+
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
369
|
+
|
370
|
+
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
+
|
372
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
+
|
353
374
|
## iap.TunnelIamPolicy
|
354
375
|
|
355
376
|
```python
|
@@ -610,6 +631,27 @@ class TunnelIamBinding(pulumi.CustomResource):
|
|
610
631
|
})
|
611
632
|
```
|
612
633
|
|
634
|
+
## This resource supports User Project Overrides.
|
635
|
+
|
636
|
+
-
|
637
|
+
|
638
|
+
# IAM policy for Identity-Aware Proxy Tunnel
|
639
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
640
|
+
|
641
|
+
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
642
|
+
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
643
|
+
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
644
|
+
|
645
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
+
|
647
|
+
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
648
|
+
|
649
|
+
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
650
|
+
|
651
|
+
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
+
|
653
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
+
|
613
655
|
## iap.TunnelIamPolicy
|
614
656
|
|
615
657
|
```python
|
@@ -350,6 +350,27 @@ class TunnelIamMember(pulumi.CustomResource):
|
|
350
350
|
})
|
351
351
|
```
|
352
352
|
|
353
|
+
## This resource supports User Project Overrides.
|
354
|
+
|
355
|
+
-
|
356
|
+
|
357
|
+
# IAM policy for Identity-Aware Proxy Tunnel
|
358
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
359
|
+
|
360
|
+
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
361
|
+
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
362
|
+
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
363
|
+
|
364
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
365
|
+
|
366
|
+
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
367
|
+
|
368
|
+
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
369
|
+
|
370
|
+
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
371
|
+
|
372
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
373
|
+
|
353
374
|
## iap.TunnelIamPolicy
|
354
375
|
|
355
376
|
```python
|
@@ -610,6 +631,27 @@ class TunnelIamMember(pulumi.CustomResource):
|
|
610
631
|
})
|
611
632
|
```
|
612
633
|
|
634
|
+
## This resource supports User Project Overrides.
|
635
|
+
|
636
|
+
-
|
637
|
+
|
638
|
+
# IAM policy for Identity-Aware Proxy Tunnel
|
639
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
640
|
+
|
641
|
+
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
642
|
+
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
643
|
+
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
644
|
+
|
645
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
646
|
+
|
647
|
+
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
648
|
+
|
649
|
+
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
650
|
+
|
651
|
+
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
652
|
+
|
653
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
654
|
+
|
613
655
|
## iap.TunnelIamPolicy
|
614
656
|
|
615
657
|
```python
|
@@ -235,6 +235,27 @@ class TunnelIamPolicy(pulumi.CustomResource):
|
|
235
235
|
})
|
236
236
|
```
|
237
237
|
|
238
|
+
## This resource supports User Project Overrides.
|
239
|
+
|
240
|
+
-
|
241
|
+
|
242
|
+
# IAM policy for Identity-Aware Proxy Tunnel
|
243
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
244
|
+
|
245
|
+
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
246
|
+
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
247
|
+
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
248
|
+
|
249
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
250
|
+
|
251
|
+
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
252
|
+
|
253
|
+
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
254
|
+
|
255
|
+
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
256
|
+
|
257
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
258
|
+
|
238
259
|
## iap.TunnelIamPolicy
|
239
260
|
|
240
261
|
```python
|
@@ -481,6 +502,27 @@ class TunnelIamPolicy(pulumi.CustomResource):
|
|
481
502
|
})
|
482
503
|
```
|
483
504
|
|
505
|
+
## This resource supports User Project Overrides.
|
506
|
+
|
507
|
+
-
|
508
|
+
|
509
|
+
# IAM policy for Identity-Aware Proxy Tunnel
|
510
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
|
511
|
+
|
512
|
+
* `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
|
513
|
+
* `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
|
514
|
+
* `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
|
515
|
+
|
516
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
517
|
+
|
518
|
+
* `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
|
519
|
+
|
520
|
+
> **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
|
521
|
+
|
522
|
+
> **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
|
523
|
+
|
524
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
525
|
+
|
484
526
|
## iap.TunnelIamPolicy
|
485
527
|
|
486
528
|
```python
|
@@ -419,6 +419,27 @@ class TunnelInstanceIAMBinding(pulumi.CustomResource):
|
|
419
419
|
})
|
420
420
|
```
|
421
421
|
|
422
|
+
## This resource supports User Project Overrides.
|
423
|
+
|
424
|
+
-
|
425
|
+
|
426
|
+
# IAM policy for Identity-Aware Proxy TunnelInstance
|
427
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
428
|
+
|
429
|
+
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
430
|
+
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
431
|
+
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
432
|
+
|
433
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
434
|
+
|
435
|
+
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
436
|
+
|
437
|
+
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
438
|
+
|
439
|
+
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
440
|
+
|
441
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
442
|
+
|
422
443
|
## iap.TunnelInstanceIAMPolicy
|
423
444
|
|
424
445
|
```python
|
@@ -710,6 +731,27 @@ class TunnelInstanceIAMBinding(pulumi.CustomResource):
|
|
710
731
|
})
|
711
732
|
```
|
712
733
|
|
734
|
+
## This resource supports User Project Overrides.
|
735
|
+
|
736
|
+
-
|
737
|
+
|
738
|
+
# IAM policy for Identity-Aware Proxy TunnelInstance
|
739
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
740
|
+
|
741
|
+
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
742
|
+
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
743
|
+
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
744
|
+
|
745
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
746
|
+
|
747
|
+
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
748
|
+
|
749
|
+
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
750
|
+
|
751
|
+
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
752
|
+
|
753
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
754
|
+
|
713
755
|
## iap.TunnelInstanceIAMPolicy
|
714
756
|
|
715
757
|
```python
|
@@ -419,6 +419,27 @@ class TunnelInstanceIAMMember(pulumi.CustomResource):
|
|
419
419
|
})
|
420
420
|
```
|
421
421
|
|
422
|
+
## This resource supports User Project Overrides.
|
423
|
+
|
424
|
+
-
|
425
|
+
|
426
|
+
# IAM policy for Identity-Aware Proxy TunnelInstance
|
427
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
428
|
+
|
429
|
+
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
430
|
+
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
431
|
+
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
432
|
+
|
433
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
434
|
+
|
435
|
+
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
436
|
+
|
437
|
+
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
438
|
+
|
439
|
+
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
440
|
+
|
441
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
442
|
+
|
422
443
|
## iap.TunnelInstanceIAMPolicy
|
423
444
|
|
424
445
|
```python
|
@@ -710,6 +731,27 @@ class TunnelInstanceIAMMember(pulumi.CustomResource):
|
|
710
731
|
})
|
711
732
|
```
|
712
733
|
|
734
|
+
## This resource supports User Project Overrides.
|
735
|
+
|
736
|
+
-
|
737
|
+
|
738
|
+
# IAM policy for Identity-Aware Proxy TunnelInstance
|
739
|
+
Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
|
740
|
+
|
741
|
+
* `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
|
742
|
+
* `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
|
743
|
+
* `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
|
744
|
+
|
745
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
746
|
+
|
747
|
+
* `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
|
748
|
+
|
749
|
+
> **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
|
750
|
+
|
751
|
+
> **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
|
752
|
+
|
753
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
754
|
+
|
713
755
|
## iap.TunnelInstanceIAMPolicy
|
714
756
|
|
715
757
|
```python
|