pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723631483__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
- pulumi_gcp/apigateway/api_iam_binding.py +38 -0
- pulumi_gcp/apigateway/api_iam_member.py +38 -0
- pulumi_gcp/apigateway/api_iam_policy.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
- pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
- pulumi_gcp/apigee/environment_iam_binding.py +40 -0
- pulumi_gcp/apigee/environment_iam_member.py +40 -0
- pulumi_gcp/apigee/environment_iam_policy.py +40 -0
- pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
- pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
- pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
- pulumi_gcp/bigquery/connection_iam_member.py +38 -0
- pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
- pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
- pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
- pulumi_gcp/bigquery/iam_binding.py +42 -0
- pulumi_gcp/bigquery/iam_member.py +42 -0
- pulumi_gcp/bigquery/iam_policy.py +42 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
- pulumi_gcp/cloudrun/iam_binding.py +38 -0
- pulumi_gcp/cloudrun/iam_member.py +38 -0
- pulumi_gcp/cloudrun/iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
- pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
- pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
- pulumi_gcp/compute/disk_iam_binding.py +38 -0
- pulumi_gcp/compute/disk_iam_member.py +38 -0
- pulumi_gcp/compute/disk_iam_policy.py +38 -0
- pulumi_gcp/compute/image_iam_binding.py +42 -0
- pulumi_gcp/compute/image_iam_member.py +42 -0
- pulumi_gcp/compute/image_iam_policy.py +42 -0
- pulumi_gcp/compute/instance_iam_binding.py +42 -0
- pulumi_gcp/compute/instance_iam_member.py +42 -0
- pulumi_gcp/compute/instance_iam_policy.py +42 -0
- pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
- pulumi_gcp/compute/machine_image_iam_member.py +40 -0
- pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
- pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
- pulumi_gcp/compute/region_disk_iam_member.py +38 -0
- pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
- pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
- pulumi_gcp/compute/snapshot_iam_member.py +38 -0
- pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
- pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
- pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
- pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
- pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
- pulumi_gcp/dataplex/asset_iam_member.py +38 -0
- pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
- pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
- pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
- pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
- pulumi_gcp/dataplex/lake_iam_member.py +38 -0
- pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
- pulumi_gcp/dataplex/task_iam_binding.py +38 -0
- pulumi_gcp/dataplex/task_iam_member.py +38 -0
- pulumi_gcp/dataplex/task_iam_policy.py +38 -0
- pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
- pulumi_gcp/dataplex/zone_iam_member.py +38 -0
- pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
- pulumi_gcp/endpoints/service_iam_binding.py +40 -0
- pulumi_gcp/endpoints/service_iam_member.py +40 -0
- pulumi_gcp/endpoints/service_iam_policy.py +40 -0
- pulumi_gcp/folder/iam_audit_config.py +0 -86
- pulumi_gcp/folder/iam_member.py +0 -86
- pulumi_gcp/folder/iam_policy.py +0 -86
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
- pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
- pulumi_gcp/gkehub/feature_iam_member.py +38 -0
- pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
- pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
- pulumi_gcp/gkehub/membership_iam_member.py +38 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
- pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
- pulumi_gcp/gkehub/scope_iam_member.py +38 -0
- pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
- pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
- pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
- pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
- pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
- pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
- pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_iam_binding.py +42 -0
- pulumi_gcp/iap/web_iam_member.py +42 -0
- pulumi_gcp/iap/web_iam_policy.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
- pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
- pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
- pulumi_gcp/kms/key_ring_iam_member.py +0 -82
- pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
- pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
- pulumi_gcp/notebooks/instance_iam_member.py +38 -0
- pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
- pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
- pulumi_gcp/organizations/iam_member.py +0 -94
- pulumi_gcp/organizations/iam_policy.py +0 -94
- pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
- pulumi_gcp/pubsub/schema_iam_member.py +38 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
- pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
- pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
- pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
- pulumi_gcp/pubsub/topic_iam_member.py +38 -0
- pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
- pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
- pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
- pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
- pulumi_gcp/serviceaccount/get_account.py +6 -6
- pulumi_gcp/serviceaccount/key.py +6 -6
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
- pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
- pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
- pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
- pulumi_gcp/spanner/database_iam_binding.py +0 -74
- pulumi_gcp/spanner/database_iam_member.py +0 -74
- pulumi_gcp/spanner/database_iam_policy.py +0 -74
- pulumi_gcp/spanner/instance_iam_binding.py +0 -30
- pulumi_gcp/spanner/instance_iam_member.py +0 -30
- pulumi_gcp/spanner/instance_iam_policy.py +0 -30
- pulumi_gcp/storage/bucket_iam_binding.py +42 -0
- pulumi_gcp/storage/bucket_iam_member.py +42 -0
- pulumi_gcp/storage/bucket_iam_policy.py +42 -0
- pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
- pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
- pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_key_iam_member.py +40 -0
- pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
- pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
- pulumi_gcp/tags/tag_value_iam_member.py +40 -0
- pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/RECORD +264 -264
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/WHEEL +1 -1
- {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/top_level.txt +0 -0
@@ -320,6 +320,25 @@ class SnapshotIamMember(pulumi.CustomResource):
|
|
320
320
|
member="user:jane@example.com")
|
321
321
|
```
|
322
322
|
|
323
|
+
## This resource supports User Project Overrides.
|
324
|
+
|
325
|
+
-
|
326
|
+
|
327
|
+
# IAM policy for Compute Engine Snapshot
|
328
|
+
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
329
|
+
|
330
|
+
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
331
|
+
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
332
|
+
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
333
|
+
|
334
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
335
|
+
|
336
|
+
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
337
|
+
|
338
|
+
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
339
|
+
|
340
|
+
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
341
|
+
|
323
342
|
## compute.SnapshotIamPolicy
|
324
343
|
|
325
344
|
```python
|
@@ -481,6 +500,25 @@ class SnapshotIamMember(pulumi.CustomResource):
|
|
481
500
|
member="user:jane@example.com")
|
482
501
|
```
|
483
502
|
|
503
|
+
## This resource supports User Project Overrides.
|
504
|
+
|
505
|
+
-
|
506
|
+
|
507
|
+
# IAM policy for Compute Engine Snapshot
|
508
|
+
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
509
|
+
|
510
|
+
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
511
|
+
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
512
|
+
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
513
|
+
|
514
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
515
|
+
|
516
|
+
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
517
|
+
|
518
|
+
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
519
|
+
|
520
|
+
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
521
|
+
|
484
522
|
## compute.SnapshotIamPolicy
|
485
523
|
|
486
524
|
```python
|
@@ -217,6 +217,25 @@ class SnapshotIamPolicy(pulumi.CustomResource):
|
|
217
217
|
member="user:jane@example.com")
|
218
218
|
```
|
219
219
|
|
220
|
+
## This resource supports User Project Overrides.
|
221
|
+
|
222
|
+
-
|
223
|
+
|
224
|
+
# IAM policy for Compute Engine Snapshot
|
225
|
+
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
226
|
+
|
227
|
+
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
228
|
+
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
229
|
+
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
230
|
+
|
231
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
232
|
+
|
233
|
+
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
234
|
+
|
235
|
+
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
236
|
+
|
237
|
+
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
238
|
+
|
220
239
|
## compute.SnapshotIamPolicy
|
221
240
|
|
222
241
|
```python
|
@@ -366,6 +385,25 @@ class SnapshotIamPolicy(pulumi.CustomResource):
|
|
366
385
|
member="user:jane@example.com")
|
367
386
|
```
|
368
387
|
|
388
|
+
## This resource supports User Project Overrides.
|
389
|
+
|
390
|
+
-
|
391
|
+
|
392
|
+
# IAM policy for Compute Engine Snapshot
|
393
|
+
Three different resources help you manage your IAM policy for Compute Engine Snapshot. Each of these resources serves a different use case:
|
394
|
+
|
395
|
+
* `compute.SnapshotIamPolicy`: Authoritative. Sets the IAM policy for the snapshot and replaces any existing policy already attached.
|
396
|
+
* `compute.SnapshotIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the snapshot are preserved.
|
397
|
+
* `compute.SnapshotIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the snapshot are preserved.
|
398
|
+
|
399
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
400
|
+
|
401
|
+
* `compute.SnapshotIamPolicy`: Retrieves the IAM policy for the snapshot
|
402
|
+
|
403
|
+
> **Note:** `compute.SnapshotIamPolicy` **cannot** be used in conjunction with `compute.SnapshotIamBinding` and `compute.SnapshotIamMember` or they will fight over what your policy should be.
|
404
|
+
|
405
|
+
> **Note:** `compute.SnapshotIamBinding` resources **can be** used in conjunction with `compute.SnapshotIamMember` resources **only if** they do not grant privilege to the same role.
|
406
|
+
|
369
407
|
## compute.SnapshotIamPolicy
|
370
408
|
|
371
409
|
```python
|
@@ -439,6 +439,27 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
|
|
439
439
|
})
|
440
440
|
```
|
441
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Compute Engine Subnetwork
|
447
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
450
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
451
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
456
|
+
|
457
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
461
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
462
|
+
|
442
463
|
## compute.SubnetworkIAMPolicy
|
443
464
|
|
444
465
|
```python
|
@@ -732,6 +753,27 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
|
|
732
753
|
})
|
733
754
|
```
|
734
755
|
|
756
|
+
## This resource supports User Project Overrides.
|
757
|
+
|
758
|
+
-
|
759
|
+
|
760
|
+
# IAM policy for Compute Engine Subnetwork
|
761
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
762
|
+
|
763
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
764
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
765
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
766
|
+
|
767
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
768
|
+
|
769
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
770
|
+
|
771
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
772
|
+
|
773
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
774
|
+
|
775
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
776
|
+
|
735
777
|
## compute.SubnetworkIAMPolicy
|
736
778
|
|
737
779
|
```python
|
@@ -439,6 +439,27 @@ class SubnetworkIAMMember(pulumi.CustomResource):
|
|
439
439
|
})
|
440
440
|
```
|
441
441
|
|
442
|
+
## This resource supports User Project Overrides.
|
443
|
+
|
444
|
+
-
|
445
|
+
|
446
|
+
# IAM policy for Compute Engine Subnetwork
|
447
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
448
|
+
|
449
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
450
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
451
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
452
|
+
|
453
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
454
|
+
|
455
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
456
|
+
|
457
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
458
|
+
|
459
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
460
|
+
|
461
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
462
|
+
|
442
463
|
## compute.SubnetworkIAMPolicy
|
443
464
|
|
444
465
|
```python
|
@@ -732,6 +753,27 @@ class SubnetworkIAMMember(pulumi.CustomResource):
|
|
732
753
|
})
|
733
754
|
```
|
734
755
|
|
756
|
+
## This resource supports User Project Overrides.
|
757
|
+
|
758
|
+
-
|
759
|
+
|
760
|
+
# IAM policy for Compute Engine Subnetwork
|
761
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
762
|
+
|
763
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
764
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
765
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
766
|
+
|
767
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
768
|
+
|
769
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
770
|
+
|
771
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
772
|
+
|
773
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
774
|
+
|
775
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
776
|
+
|
735
777
|
## compute.SubnetworkIAMPolicy
|
736
778
|
|
737
779
|
```python
|
@@ -324,6 +324,27 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
|
|
324
324
|
})
|
325
325
|
```
|
326
326
|
|
327
|
+
## This resource supports User Project Overrides.
|
328
|
+
|
329
|
+
-
|
330
|
+
|
331
|
+
# IAM policy for Compute Engine Subnetwork
|
332
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
333
|
+
|
334
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
335
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
336
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
337
|
+
|
338
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
339
|
+
|
340
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
341
|
+
|
342
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
343
|
+
|
344
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
345
|
+
|
346
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
347
|
+
|
327
348
|
## compute.SubnetworkIAMPolicy
|
328
349
|
|
329
350
|
```python
|
@@ -603,6 +624,27 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
|
|
603
624
|
})
|
604
625
|
```
|
605
626
|
|
627
|
+
## This resource supports User Project Overrides.
|
628
|
+
|
629
|
+
-
|
630
|
+
|
631
|
+
# IAM policy for Compute Engine Subnetwork
|
632
|
+
Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
|
633
|
+
|
634
|
+
* `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
|
635
|
+
* `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
|
636
|
+
* `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
|
637
|
+
|
638
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
639
|
+
|
640
|
+
* `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
|
641
|
+
|
642
|
+
> **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
|
643
|
+
|
644
|
+
> **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
|
645
|
+
|
646
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
647
|
+
|
606
648
|
## compute.SubnetworkIAMPolicy
|
607
649
|
|
608
650
|
```python
|
@@ -319,6 +319,25 @@ class NoteIamBinding(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Container Registry Note
|
327
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
330
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
331
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
336
|
+
|
337
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## containeranalysis.NoteIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class NoteIamBinding(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Container Registry Note
|
507
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
510
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
511
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
516
|
+
|
517
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## containeranalysis.NoteIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -319,6 +319,25 @@ class NoteIamMember(pulumi.CustomResource):
|
|
319
319
|
member="user:jane@example.com")
|
320
320
|
```
|
321
321
|
|
322
|
+
## This resource supports User Project Overrides.
|
323
|
+
|
324
|
+
-
|
325
|
+
|
326
|
+
# IAM policy for Container Registry Note
|
327
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
328
|
+
|
329
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
330
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
331
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
332
|
+
|
333
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
334
|
+
|
335
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
336
|
+
|
337
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
338
|
+
|
339
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
340
|
+
|
322
341
|
## containeranalysis.NoteIamPolicy
|
323
342
|
|
324
343
|
```python
|
@@ -480,6 +499,25 @@ class NoteIamMember(pulumi.CustomResource):
|
|
480
499
|
member="user:jane@example.com")
|
481
500
|
```
|
482
501
|
|
502
|
+
## This resource supports User Project Overrides.
|
503
|
+
|
504
|
+
-
|
505
|
+
|
506
|
+
# IAM policy for Container Registry Note
|
507
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
508
|
+
|
509
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
510
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
511
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
512
|
+
|
513
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
514
|
+
|
515
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
516
|
+
|
517
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
518
|
+
|
519
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
520
|
+
|
483
521
|
## containeranalysis.NoteIamPolicy
|
484
522
|
|
485
523
|
```python
|
@@ -216,6 +216,25 @@ class NoteIamPolicy(pulumi.CustomResource):
|
|
216
216
|
member="user:jane@example.com")
|
217
217
|
```
|
218
218
|
|
219
|
+
## This resource supports User Project Overrides.
|
220
|
+
|
221
|
+
-
|
222
|
+
|
223
|
+
# IAM policy for Container Registry Note
|
224
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
225
|
+
|
226
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
227
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
228
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
229
|
+
|
230
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
231
|
+
|
232
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
233
|
+
|
234
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
235
|
+
|
236
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
237
|
+
|
219
238
|
## containeranalysis.NoteIamPolicy
|
220
239
|
|
221
240
|
```python
|
@@ -365,6 +384,25 @@ class NoteIamPolicy(pulumi.CustomResource):
|
|
365
384
|
member="user:jane@example.com")
|
366
385
|
```
|
367
386
|
|
387
|
+
## This resource supports User Project Overrides.
|
388
|
+
|
389
|
+
-
|
390
|
+
|
391
|
+
# IAM policy for Container Registry Note
|
392
|
+
Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
|
393
|
+
|
394
|
+
* `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
|
395
|
+
* `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
|
396
|
+
* `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
|
397
|
+
|
398
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
399
|
+
|
400
|
+
* `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
|
401
|
+
|
402
|
+
> **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
|
403
|
+
|
404
|
+
> **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
|
405
|
+
|
368
406
|
## containeranalysis.NoteIamPolicy
|
369
407
|
|
370
408
|
```python
|
@@ -341,6 +341,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog EntryGroup
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
353
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.EntryGroupIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog EntryGroup
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
529
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.EntryGroupIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -341,6 +341,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
341
341
|
member="user:jane@example.com")
|
342
342
|
```
|
343
343
|
|
344
|
+
## This resource supports User Project Overrides.
|
345
|
+
|
346
|
+
-
|
347
|
+
|
348
|
+
# IAM policy for Data catalog EntryGroup
|
349
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
350
|
+
|
351
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
352
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
353
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
354
|
+
|
355
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
356
|
+
|
357
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
358
|
+
|
359
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
360
|
+
|
361
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
362
|
+
|
344
363
|
## datacatalog.EntryGroupIamPolicy
|
345
364
|
|
346
365
|
```python
|
@@ -498,6 +517,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
|
|
498
517
|
member="user:jane@example.com")
|
499
518
|
```
|
500
519
|
|
520
|
+
## This resource supports User Project Overrides.
|
521
|
+
|
522
|
+
-
|
523
|
+
|
524
|
+
# IAM policy for Data catalog EntryGroup
|
525
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
526
|
+
|
527
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
528
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
529
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
530
|
+
|
531
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
532
|
+
|
533
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
534
|
+
|
535
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
536
|
+
|
537
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
538
|
+
|
501
539
|
## datacatalog.EntryGroupIamPolicy
|
502
540
|
|
503
541
|
```python
|
@@ -238,6 +238,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
238
238
|
member="user:jane@example.com")
|
239
239
|
```
|
240
240
|
|
241
|
+
## This resource supports User Project Overrides.
|
242
|
+
|
243
|
+
-
|
244
|
+
|
245
|
+
# IAM policy for Data catalog EntryGroup
|
246
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
247
|
+
|
248
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
249
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
250
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
251
|
+
|
252
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
253
|
+
|
254
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
255
|
+
|
256
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
257
|
+
|
258
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
259
|
+
|
241
260
|
## datacatalog.EntryGroupIamPolicy
|
242
261
|
|
243
262
|
```python
|
@@ -383,6 +402,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
|
|
383
402
|
member="user:jane@example.com")
|
384
403
|
```
|
385
404
|
|
405
|
+
## This resource supports User Project Overrides.
|
406
|
+
|
407
|
+
-
|
408
|
+
|
409
|
+
# IAM policy for Data catalog EntryGroup
|
410
|
+
Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
|
411
|
+
|
412
|
+
* `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
|
413
|
+
* `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
|
414
|
+
* `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
|
415
|
+
|
416
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
417
|
+
|
418
|
+
* `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
|
419
|
+
|
420
|
+
> **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
|
421
|
+
|
422
|
+
> **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
|
423
|
+
|
386
424
|
## datacatalog.EntryGroupIamPolicy
|
387
425
|
|
388
426
|
```python
|
@@ -279,6 +279,26 @@ class PolicyTagIamBinding(pulumi.CustomResource):
|
|
279
279
|
member="user:jane@example.com")
|
280
280
|
```
|
281
281
|
|
282
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
283
|
+
|
284
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
285
|
+
---
|
286
|
+
|
287
|
+
# IAM policy for Data catalog PolicyTag
|
288
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
289
|
+
|
290
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
291
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
292
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
293
|
+
|
294
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
295
|
+
|
296
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
297
|
+
|
298
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
299
|
+
|
300
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
301
|
+
|
282
302
|
## datacatalog.PolicyTagIamPolicy
|
283
303
|
|
284
304
|
```python
|
@@ -428,6 +448,26 @@ class PolicyTagIamBinding(pulumi.CustomResource):
|
|
428
448
|
member="user:jane@example.com")
|
429
449
|
```
|
430
450
|
|
451
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
452
|
+
|
453
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
454
|
+
---
|
455
|
+
|
456
|
+
# IAM policy for Data catalog PolicyTag
|
457
|
+
Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
|
458
|
+
|
459
|
+
* `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
|
460
|
+
* `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
|
461
|
+
* `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
|
462
|
+
|
463
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
464
|
+
|
465
|
+
* `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
|
466
|
+
|
467
|
+
> **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
|
468
|
+
|
469
|
+
> **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
|
470
|
+
|
431
471
|
## datacatalog.PolicyTagIamPolicy
|
432
472
|
|
433
473
|
```python
|