pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723631483__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/top_level.txt +0 -0
@@ -279,6 +279,26 @@ class TagKeyIamBinding(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Tags TagKey
|
288
|
+
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
291
|
+
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
292
|
+
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
297
|
+
|
298
|
+
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## tags.TagKeyIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -430,6 +450,26 @@ class TagKeyIamBinding(pulumi.CustomResource):
|
|
430
450
|
member="user:jane@example.com")
|
431
451
|
```
|
432
452
|
|
453
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
+
|
455
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
+
---
|
457
|
+
|
458
|
+
# IAM policy for Tags TagKey
|
459
|
+
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
460
|
+
|
461
|
+
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
462
|
+
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
463
|
+
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
464
|
+
|
465
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
+
|
467
|
+
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
468
|
+
|
469
|
+
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
470
|
+
|
471
|
+
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
+
|
433
473
|
## tags.TagKeyIamPolicy
|
434
474
|
|
435
475
|
```python
|
@@ -279,6 +279,26 @@ class TagKeyIamMember(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Tags TagKey
|
288
|
+
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
291
|
+
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
292
|
+
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
297
|
+
|
298
|
+
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## tags.TagKeyIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -430,6 +450,26 @@ class TagKeyIamMember(pulumi.CustomResource):
|
|
430
450
|
member="user:jane@example.com")
|
431
451
|
```
|
432
452
|
|
453
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
+
|
455
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
+
---
|
457
|
+
|
458
|
+
# IAM policy for Tags TagKey
|
459
|
+
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
460
|
+
|
461
|
+
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
462
|
+
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
463
|
+
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
464
|
+
|
465
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
+
|
467
|
+
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
468
|
+
|
469
|
+
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
470
|
+
|
471
|
+
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
+
|
433
473
|
## tags.TagKeyIamPolicy
|
434
474
|
|
435
475
|
```python
|
@@ -176,6 +176,26 @@ class TagKeyIamPolicy(pulumi.CustomResource):
|
|
176
176
|
member="user:jane@example.com")
|
177
177
|
```
|
178
178
|
|
179
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
180
|
+
|
181
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
182
|
+
---
|
183
|
+
|
184
|
+
# IAM policy for Tags TagKey
|
185
|
+
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
186
|
+
|
187
|
+
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
188
|
+
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
189
|
+
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
190
|
+
|
191
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
192
|
+
|
193
|
+
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
194
|
+
|
195
|
+
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
196
|
+
|
197
|
+
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
198
|
+
|
179
199
|
## tags.TagKeyIamPolicy
|
180
200
|
|
181
201
|
```python
|
@@ -315,6 +335,26 @@ class TagKeyIamPolicy(pulumi.CustomResource):
|
|
315
335
|
member="user:jane@example.com")
|
316
336
|
```
|
317
337
|
|
338
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
339
|
+
|
340
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
341
|
+
---
|
342
|
+
|
343
|
+
# IAM policy for Tags TagKey
|
344
|
+
Three different resources help you manage your IAM policy for Tags TagKey. Each of these resources serves a different use case:
|
345
|
+
|
346
|
+
* `tags.TagKeyIamPolicy`: Authoritative. Sets the IAM policy for the tagkey and replaces any existing policy already attached.
|
347
|
+
* `tags.TagKeyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagkey are preserved.
|
348
|
+
* `tags.TagKeyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagkey are preserved.
|
349
|
+
|
350
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
351
|
+
|
352
|
+
* `tags.TagKeyIamPolicy`: Retrieves the IAM policy for the tagkey
|
353
|
+
|
354
|
+
> **Note:** `tags.TagKeyIamPolicy` **cannot** be used in conjunction with `tags.TagKeyIamBinding` and `tags.TagKeyIamMember` or they will fight over what your policy should be.
|
355
|
+
|
356
|
+
> **Note:** `tags.TagKeyIamBinding` resources **can be** used in conjunction with `tags.TagKeyIamMember` resources **only if** they do not grant privilege to the same role.
|
357
|
+
|
318
358
|
## tags.TagKeyIamPolicy
|
319
359
|
|
320
360
|
```python
|
@@ -279,6 +279,26 @@ class TagValueIamBinding(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Tags TagValue
|
288
|
+
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
291
|
+
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
292
|
+
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
297
|
+
|
298
|
+
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## tags.TagValueIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -430,6 +450,26 @@ class TagValueIamBinding(pulumi.CustomResource):
|
|
430
450
|
member="user:jane@example.com")
|
431
451
|
```
|
432
452
|
|
453
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
+
|
455
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
+
---
|
457
|
+
|
458
|
+
# IAM policy for Tags TagValue
|
459
|
+
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
460
|
+
|
461
|
+
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
462
|
+
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
463
|
+
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
464
|
+
|
465
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
+
|
467
|
+
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
468
|
+
|
469
|
+
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
470
|
+
|
471
|
+
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
+
|
433
473
|
## tags.TagValueIamPolicy
|
434
474
|
|
435
475
|
```python
|
@@ -279,6 +279,26 @@ class TagValueIamMember(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Tags TagValue
|
288
|
+
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
291
|
+
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
292
|
+
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
297
|
+
|
298
|
+
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## tags.TagValueIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -430,6 +450,26 @@ class TagValueIamMember(pulumi.CustomResource):
|
|
430
450
|
member="user:jane@example.com")
|
431
451
|
```
|
432
452
|
|
453
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
454
|
+
|
455
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
456
|
+
---
|
457
|
+
|
458
|
+
# IAM policy for Tags TagValue
|
459
|
+
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
460
|
+
|
461
|
+
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
462
|
+
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
463
|
+
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
464
|
+
|
465
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
466
|
+
|
467
|
+
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
468
|
+
|
469
|
+
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
470
|
+
|
471
|
+
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
472
|
+
|
433
473
|
## tags.TagValueIamPolicy
|
434
474
|
|
435
475
|
```python
|
@@ -176,6 +176,26 @@ class TagValueIamPolicy(pulumi.CustomResource):
|
|
176
176
|
member="user:jane@example.com")
|
177
177
|
```
|
178
178
|
|
179
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
180
|
+
|
181
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
182
|
+
---
|
183
|
+
|
184
|
+
# IAM policy for Tags TagValue
|
185
|
+
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
186
|
+
|
187
|
+
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
188
|
+
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
189
|
+
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
190
|
+
|
191
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
192
|
+
|
193
|
+
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
194
|
+
|
195
|
+
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
196
|
+
|
197
|
+
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
198
|
+
|
179
199
|
## tags.TagValueIamPolicy
|
180
200
|
|
181
201
|
```python
|
@@ -315,6 +335,26 @@ class TagValueIamPolicy(pulumi.CustomResource):
|
|
315
335
|
member="user:jane@example.com")
|
316
336
|
```
|
317
337
|
|
338
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
339
|
+
|
340
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
341
|
+
---
|
342
|
+
|
343
|
+
# IAM policy for Tags TagValue
|
344
|
+
Three different resources help you manage your IAM policy for Tags TagValue. Each of these resources serves a different use case:
|
345
|
+
|
346
|
+
* `tags.TagValueIamPolicy`: Authoritative. Sets the IAM policy for the tagvalue and replaces any existing policy already attached.
|
347
|
+
* `tags.TagValueIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagvalue are preserved.
|
348
|
+
* `tags.TagValueIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagvalue are preserved.
|
349
|
+
|
350
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
351
|
+
|
352
|
+
* `tags.TagValueIamPolicy`: Retrieves the IAM policy for the tagvalue
|
353
|
+
|
354
|
+
> **Note:** `tags.TagValueIamPolicy` **cannot** be used in conjunction with `tags.TagValueIamBinding` and `tags.TagValueIamMember` or they will fight over what your policy should be.
|
355
|
+
|
356
|
+
> **Note:** `tags.TagValueIamBinding` resources **can be** used in conjunction with `tags.TagValueIamMember` resources **only if** they do not grant privilege to the same role.
|
357
|
+
|
318
358
|
## tags.TagValueIamPolicy
|
319
359
|
|
320
360
|
```python
|