pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723631483__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/top_level.txt +0 -0
@@ -363,6 +363,25 @@ class InstanceIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud AI Notebooks Instance
|
371
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
374
|
+
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
375
|
+
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
380
|
+
|
381
|
+
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## notebooks.InstanceIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class InstanceIamMember(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud AI Notebooks Instance
|
562
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
565
|
+
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
566
|
+
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
571
|
+
|
572
|
+
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## notebooks.InstanceIamPolicy
|
539
577
|
|
540
578
|
```python
|
@@ -260,6 +260,25 @@ class InstanceIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
+
## This resource supports User Project Overrides.
|
264
|
+
|
265
|
+
-
|
266
|
+
|
267
|
+
# IAM policy for Cloud AI Notebooks Instance
|
268
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
271
|
+
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
272
|
+
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
277
|
+
|
278
|
+
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
263
282
|
## notebooks.InstanceIamPolicy
|
264
283
|
|
265
284
|
```python
|
@@ -420,6 +439,25 @@ class InstanceIamPolicy(pulumi.CustomResource):
|
|
420
439
|
member="user:jane@example.com")
|
421
440
|
```
|
422
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Cloud AI Notebooks Instance
|
447
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
|
450
|
+
* `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
|
451
|
+
* `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
|
456
|
+
|
457
|
+
> **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
423
461
|
## notebooks.InstanceIamPolicy
|
424
462
|
|
425
463
|
```python
|
@@ -363,6 +363,25 @@ class RuntimeIamBinding(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud AI Notebooks Runtime
|
371
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
374
|
+
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
375
|
+
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
380
|
+
|
381
|
+
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## notebooks.RuntimeIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class RuntimeIamBinding(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud AI Notebooks Runtime
|
562
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
565
|
+
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
566
|
+
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
571
|
+
|
572
|
+
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## notebooks.RuntimeIamPolicy
|
539
577
|
|
540
578
|
```python
|
@@ -363,6 +363,25 @@ class RuntimeIamMember(pulumi.CustomResource):
|
|
363
363
|
member="user:jane@example.com")
|
364
364
|
```
|
365
365
|
|
366
|
+
## This resource supports User Project Overrides.
|
367
|
+
|
368
|
+
-
|
369
|
+
|
370
|
+
# IAM policy for Cloud AI Notebooks Runtime
|
371
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
372
|
+
|
373
|
+
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
374
|
+
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
375
|
+
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
376
|
+
|
377
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
378
|
+
|
379
|
+
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
380
|
+
|
381
|
+
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
382
|
+
|
383
|
+
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
384
|
+
|
366
385
|
## notebooks.RuntimeIamPolicy
|
367
386
|
|
368
387
|
```python
|
@@ -535,6 +554,25 @@ class RuntimeIamMember(pulumi.CustomResource):
|
|
535
554
|
member="user:jane@example.com")
|
536
555
|
```
|
537
556
|
|
557
|
+
## This resource supports User Project Overrides.
|
558
|
+
|
559
|
+
-
|
560
|
+
|
561
|
+
# IAM policy for Cloud AI Notebooks Runtime
|
562
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
563
|
+
|
564
|
+
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
565
|
+
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
566
|
+
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
567
|
+
|
568
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
569
|
+
|
570
|
+
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
571
|
+
|
572
|
+
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
573
|
+
|
574
|
+
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
575
|
+
|
538
576
|
## notebooks.RuntimeIamPolicy
|
539
577
|
|
540
578
|
```python
|
@@ -260,6 +260,25 @@ class RuntimeIamPolicy(pulumi.CustomResource):
|
|
260
260
|
member="user:jane@example.com")
|
261
261
|
```
|
262
262
|
|
263
|
+
## This resource supports User Project Overrides.
|
264
|
+
|
265
|
+
-
|
266
|
+
|
267
|
+
# IAM policy for Cloud AI Notebooks Runtime
|
268
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
271
|
+
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
272
|
+
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
277
|
+
|
278
|
+
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
263
282
|
## notebooks.RuntimeIamPolicy
|
264
283
|
|
265
284
|
```python
|
@@ -420,6 +439,25 @@ class RuntimeIamPolicy(pulumi.CustomResource):
|
|
420
439
|
member="user:jane@example.com")
|
421
440
|
```
|
422
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Cloud AI Notebooks Runtime
|
447
|
+
Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
|
450
|
+
* `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
|
451
|
+
* `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
|
456
|
+
|
457
|
+
> **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
423
461
|
## notebooks.RuntimeIamPolicy
|
424
462
|
|
425
463
|
```python
|
@@ -356,53 +356,6 @@ class IAMMember(pulumi.CustomResource):
|
|
356
356
|
])
|
357
357
|
```
|
358
358
|
|
359
|
-
## organizations.IAMPolicy
|
360
|
-
|
361
|
-
!> **Warning:** New organizations have several default policies which will,
|
362
|
-
without extreme caution, be **overwritten** by use of this resource.
|
363
|
-
The safest alternative is to use multiple `organizations.IAMBinding`
|
364
|
-
resources. This resource makes it easy to remove your own access to
|
365
|
-
an organization, which will require a call to Google Support to have
|
366
|
-
fixed, and can take multiple days to resolve.
|
367
|
-
|
368
|
-
In general, this resource should only be used with organizations
|
369
|
-
fully managed by this provider.I f you do use this resource,
|
370
|
-
the best way to be sure that you are not making dangerous changes is to start
|
371
|
-
by **importing** your existing policy, and examining the diff very closely.
|
372
|
-
|
373
|
-
```python
|
374
|
-
import pulumi
|
375
|
-
import pulumi_gcp as gcp
|
376
|
-
|
377
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
378
|
-
"role": "roles/editor",
|
379
|
-
"members": ["user:jane@example.com"],
|
380
|
-
}])
|
381
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
382
|
-
org_id="1234567890",
|
383
|
-
policy_data=admin.policy_data)
|
384
|
-
```
|
385
|
-
|
386
|
-
With IAM Conditions:
|
387
|
-
|
388
|
-
```python
|
389
|
-
import pulumi
|
390
|
-
import pulumi_gcp as gcp
|
391
|
-
|
392
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
393
|
-
"role": "roles/editor",
|
394
|
-
"members": ["user:jane@example.com"],
|
395
|
-
"condition": {
|
396
|
-
"title": "expires_after_2019_12_31",
|
397
|
-
"description": "Expiring at midnight of 2019-12-31",
|
398
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
399
|
-
},
|
400
|
-
}])
|
401
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
402
|
-
org_id="1234567890",
|
403
|
-
policy_data=admin.policy_data)
|
404
|
-
```
|
405
|
-
|
406
359
|
## organizations.IAMBinding
|
407
360
|
|
408
361
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -669,53 +622,6 @@ class IAMMember(pulumi.CustomResource):
|
|
669
622
|
])
|
670
623
|
```
|
671
624
|
|
672
|
-
## organizations.IAMPolicy
|
673
|
-
|
674
|
-
!> **Warning:** New organizations have several default policies which will,
|
675
|
-
without extreme caution, be **overwritten** by use of this resource.
|
676
|
-
The safest alternative is to use multiple `organizations.IAMBinding`
|
677
|
-
resources. This resource makes it easy to remove your own access to
|
678
|
-
an organization, which will require a call to Google Support to have
|
679
|
-
fixed, and can take multiple days to resolve.
|
680
|
-
|
681
|
-
In general, this resource should only be used with organizations
|
682
|
-
fully managed by this provider.I f you do use this resource,
|
683
|
-
the best way to be sure that you are not making dangerous changes is to start
|
684
|
-
by **importing** your existing policy, and examining the diff very closely.
|
685
|
-
|
686
|
-
```python
|
687
|
-
import pulumi
|
688
|
-
import pulumi_gcp as gcp
|
689
|
-
|
690
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
691
|
-
"role": "roles/editor",
|
692
|
-
"members": ["user:jane@example.com"],
|
693
|
-
}])
|
694
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
695
|
-
org_id="1234567890",
|
696
|
-
policy_data=admin.policy_data)
|
697
|
-
```
|
698
|
-
|
699
|
-
With IAM Conditions:
|
700
|
-
|
701
|
-
```python
|
702
|
-
import pulumi
|
703
|
-
import pulumi_gcp as gcp
|
704
|
-
|
705
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
706
|
-
"role": "roles/editor",
|
707
|
-
"members": ["user:jane@example.com"],
|
708
|
-
"condition": {
|
709
|
-
"title": "expires_after_2019_12_31",
|
710
|
-
"description": "Expiring at midnight of 2019-12-31",
|
711
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
712
|
-
},
|
713
|
-
}])
|
714
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
715
|
-
org_id="1234567890",
|
716
|
-
policy_data=admin.policy_data)
|
717
|
-
```
|
718
|
-
|
719
625
|
## organizations.IAMBinding
|
720
626
|
|
721
627
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -285,53 +285,6 @@ class IAMPolicy(pulumi.CustomResource):
|
|
285
285
|
])
|
286
286
|
```
|
287
287
|
|
288
|
-
## organizations.IAMPolicy
|
289
|
-
|
290
|
-
!> **Warning:** New organizations have several default policies which will,
|
291
|
-
without extreme caution, be **overwritten** by use of this resource.
|
292
|
-
The safest alternative is to use multiple `organizations.IAMBinding`
|
293
|
-
resources. This resource makes it easy to remove your own access to
|
294
|
-
an organization, which will require a call to Google Support to have
|
295
|
-
fixed, and can take multiple days to resolve.
|
296
|
-
|
297
|
-
In general, this resource should only be used with organizations
|
298
|
-
fully managed by this provider.I f you do use this resource,
|
299
|
-
the best way to be sure that you are not making dangerous changes is to start
|
300
|
-
by **importing** your existing policy, and examining the diff very closely.
|
301
|
-
|
302
|
-
```python
|
303
|
-
import pulumi
|
304
|
-
import pulumi_gcp as gcp
|
305
|
-
|
306
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
307
|
-
"role": "roles/editor",
|
308
|
-
"members": ["user:jane@example.com"],
|
309
|
-
}])
|
310
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
311
|
-
org_id="1234567890",
|
312
|
-
policy_data=admin.policy_data)
|
313
|
-
```
|
314
|
-
|
315
|
-
With IAM Conditions:
|
316
|
-
|
317
|
-
```python
|
318
|
-
import pulumi
|
319
|
-
import pulumi_gcp as gcp
|
320
|
-
|
321
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
322
|
-
"role": "roles/editor",
|
323
|
-
"members": ["user:jane@example.com"],
|
324
|
-
"condition": {
|
325
|
-
"title": "expires_after_2019_12_31",
|
326
|
-
"description": "Expiring at midnight of 2019-12-31",
|
327
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
328
|
-
},
|
329
|
-
}])
|
330
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
331
|
-
org_id="1234567890",
|
332
|
-
policy_data=admin.policy_data)
|
333
|
-
```
|
334
|
-
|
335
288
|
## organizations.IAMBinding
|
336
289
|
|
337
290
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -595,53 +548,6 @@ class IAMPolicy(pulumi.CustomResource):
|
|
595
548
|
])
|
596
549
|
```
|
597
550
|
|
598
|
-
## organizations.IAMPolicy
|
599
|
-
|
600
|
-
!> **Warning:** New organizations have several default policies which will,
|
601
|
-
without extreme caution, be **overwritten** by use of this resource.
|
602
|
-
The safest alternative is to use multiple `organizations.IAMBinding`
|
603
|
-
resources. This resource makes it easy to remove your own access to
|
604
|
-
an organization, which will require a call to Google Support to have
|
605
|
-
fixed, and can take multiple days to resolve.
|
606
|
-
|
607
|
-
In general, this resource should only be used with organizations
|
608
|
-
fully managed by this provider.I f you do use this resource,
|
609
|
-
the best way to be sure that you are not making dangerous changes is to start
|
610
|
-
by **importing** your existing policy, and examining the diff very closely.
|
611
|
-
|
612
|
-
```python
|
613
|
-
import pulumi
|
614
|
-
import pulumi_gcp as gcp
|
615
|
-
|
616
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
617
|
-
"role": "roles/editor",
|
618
|
-
"members": ["user:jane@example.com"],
|
619
|
-
}])
|
620
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
621
|
-
org_id="1234567890",
|
622
|
-
policy_data=admin.policy_data)
|
623
|
-
```
|
624
|
-
|
625
|
-
With IAM Conditions:
|
626
|
-
|
627
|
-
```python
|
628
|
-
import pulumi
|
629
|
-
import pulumi_gcp as gcp
|
630
|
-
|
631
|
-
admin = gcp.organizations.get_iam_policy(bindings=[{
|
632
|
-
"role": "roles/editor",
|
633
|
-
"members": ["user:jane@example.com"],
|
634
|
-
"condition": {
|
635
|
-
"title": "expires_after_2019_12_31",
|
636
|
-
"description": "Expiring at midnight of 2019-12-31",
|
637
|
-
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
638
|
-
},
|
639
|
-
}])
|
640
|
-
organization = gcp.organizations.IAMPolicy("organization",
|
641
|
-
org_id="1234567890",
|
642
|
-
policy_data=admin.policy_data)
|
643
|
-
```
|
644
|
-
|
645
551
|
## organizations.IAMBinding
|
646
552
|
|
647
553
|
> **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
|
@@ -319,6 +319,25 @@ class SchemaIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Schema
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
330
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
331
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
336
|
+
|
337
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.SchemaIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class SchemaIamBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Schema
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
510
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
511
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
516
|
+
|
517
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.SchemaIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class SchemaIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Cloud Pub/Sub Schema
|
327
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
330
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
331
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
336
|
+
|
337
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## pubsub.SchemaIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class SchemaIamMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Cloud Pub/Sub Schema
|
507
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
510
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
511
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
516
|
+
|
517
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## pubsub.SchemaIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class SchemaIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Cloud Pub/Sub Schema
|
224
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
227
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
228
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
233
|
+
|
234
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## pubsub.SchemaIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class SchemaIamPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Cloud Pub/Sub Schema
|
392
|
+
Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
|
395
|
+
* `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
|
396
|
+
* `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
|
401
|
+
|
402
|
+
> **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## pubsub.SchemaIamPolicy
|
369
407
|
|
370
408
|
```python
|