pulumi-gcp 8.20.0a1739946722__py3-none-any.whl → 8.21.0a1740033009__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +48 -0
- pulumi_gcp/accesscontextmanager/_inputs.py +168 -8
- pulumi_gcp/accesscontextmanager/get_access_policy_iam_policy.py +2 -2
- pulumi_gcp/accesscontextmanager/outputs.py +104 -8
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +78 -3
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +78 -3
- pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +78 -3
- pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +78 -3
- pulumi_gcp/alloydb/__init__.py +1 -0
- pulumi_gcp/alloydb/get_instance.py +466 -0
- pulumi_gcp/alloydb/outputs.py +352 -0
- pulumi_gcp/apigateway/get_api_config_iam_policy.py +20 -2
- pulumi_gcp/apigateway/get_api_iam_policy.py +20 -2
- pulumi_gcp/apigateway/get_gateway_iam_policy.py +22 -2
- pulumi_gcp/apigee/get_environment_iam_policy.py +2 -2
- pulumi_gcp/artifactregistry/get_repository_iam_policy.py +2 -2
- pulumi_gcp/beyondcorp/get_application_iam_policy.py +2 -2
- pulumi_gcp/beyondcorp/get_security_gateway_iam_policy.py +2 -2
- pulumi_gcp/bigquery/connection.py +2 -14
- pulumi_gcp/bigquery/get_connection_iam_policy.py +2 -2
- pulumi_gcp/bigquery/get_table_iam_policy.py +2 -2
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +8 -8
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +8 -8
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +8 -8
- pulumi_gcp/bigqueryanalyticshub/get_data_exchange_iam_policy.py +2 -2
- pulumi_gcp/bigqueryanalyticshub/get_listing_iam_policy.py +2 -2
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +8 -8
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +8 -8
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +8 -8
- pulumi_gcp/bigquerydatapolicy/get_iam_policy.py +2 -2
- pulumi_gcp/binaryauthorization/get_attestor_iam_policy.py +2 -2
- pulumi_gcp/certificateauthority/get_ca_pool_iam_policy.py +2 -2
- pulumi_gcp/certificateauthority/get_certificate_template_iam_policy.py +2 -2
- pulumi_gcp/cloudbuildv2/get_connection_iam_policy.py +2 -2
- pulumi_gcp/clouddeploy/get_custom_target_type_iam_policy.py +2 -2
- pulumi_gcp/clouddeploy/get_delivery_pipeline_iam_policy.py +2 -2
- pulumi_gcp/clouddeploy/get_target_iam_policy.py +2 -2
- pulumi_gcp/cloudfunctions/get_function_iam_policy.py +2 -2
- pulumi_gcp/cloudfunctionsv2/get_function_iam_policy.py +2 -2
- pulumi_gcp/cloudrun/_inputs.py +6 -3
- pulumi_gcp/cloudrun/get_service_iam_policy.py +2 -2
- pulumi_gcp/cloudrun/outputs.py +4 -2
- pulumi_gcp/cloudrunv2/get_job_iam_policy.py +2 -2
- pulumi_gcp/cloudrunv2/get_service_iam_policy.py +2 -2
- pulumi_gcp/cloudtasks/get_queue_iam_policy.py +2 -2
- pulumi_gcp/colab/get_runtime_template_iam_policy.py +2 -2
- pulumi_gcp/composer/_inputs.py +6 -6
- pulumi_gcp/composer/outputs.py +8 -8
- pulumi_gcp/compute/_inputs.py +756 -30
- pulumi_gcp/compute/firewall_policy_rule.py +0 -2
- pulumi_gcp/compute/get_backend_bucket_iam_policy.py +20 -2
- pulumi_gcp/compute/get_backend_service_iam_policy.py +20 -2
- pulumi_gcp/compute/get_disk_iam_policy.py +2 -2
- pulumi_gcp/compute/get_hc_vpn_gateway.py +45 -1
- pulumi_gcp/compute/get_image_iam_policy.py +2 -2
- pulumi_gcp/compute/get_instance_iam_policy.py +2 -2
- pulumi_gcp/compute/get_instance_template_iam_policy.py +2 -2
- pulumi_gcp/compute/get_machine_image_iam_policy.py +20 -2
- pulumi_gcp/compute/get_region_backend_service_iam_policy.py +22 -2
- pulumi_gcp/compute/get_region_disk_iam_policy.py +2 -2
- pulumi_gcp/compute/get_snapshot_iam_policy.py +2 -2
- pulumi_gcp/compute/get_subnetwork_iam_policy.py +2 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +189 -2
- pulumi_gcp/compute/instance_template.py +14 -35
- pulumi_gcp/compute/outputs.py +796 -18
- pulumi_gcp/config/__init__.pyi +2 -0
- pulumi_gcp/config/vars.py +4 -0
- pulumi_gcp/container/_inputs.py +447 -3
- pulumi_gcp/container/outputs.py +469 -5
- pulumi_gcp/containeranalysis/get_note_iam_policy.py +2 -2
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +8 -8
- pulumi_gcp/datacatalog/entry_group_iam_member.py +8 -8
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +8 -8
- pulumi_gcp/datacatalog/get_entry_group_iam_policy.py +2 -2
- pulumi_gcp/datacatalog/get_policy_tag_iam_policy.py +2 -2
- pulumi_gcp/datacatalog/get_tag_template_iam_policy.py +2 -2
- pulumi_gcp/datacatalog/get_taxonomy_iam_policy.py +2 -2
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +8 -8
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +8 -8
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +8 -8
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +8 -8
- pulumi_gcp/datacatalog/tag_template_iam_member.py +8 -8
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +8 -8
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +8 -8
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +8 -8
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +8 -8
- pulumi_gcp/dataform/get_repository_iam_policy.py +22 -2
- pulumi_gcp/datafusion/get_instance_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_aspect_type_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_asset_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_datascan_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_entry_group_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_entry_type_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_lake_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_task_iam_policy.py +2 -2
- pulumi_gcp/dataplex/get_zone_iam_policy.py +2 -2
- pulumi_gcp/dataproc/get_autoscaling_policy_iam_policy.py +2 -2
- pulumi_gcp/dataproc/get_metastore_federation_iam_policy.py +2 -2
- pulumi_gcp/dataproc/get_metastore_service_iam_policy.py +2 -2
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +8 -8
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +8 -8
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +8 -8
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +8 -8
- pulumi_gcp/dataproc/metastore_service_iam_member.py +8 -8
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +8 -8
- pulumi_gcp/dns/get_managed_zone_iam_policy.py +2 -2
- pulumi_gcp/endpoints/get_service_iam_policy.py +2 -2
- pulumi_gcp/eventarc/_inputs.py +29 -8
- pulumi_gcp/eventarc/google_channel_config.py +58 -46
- pulumi_gcp/eventarc/outputs.py +20 -6
- pulumi_gcp/eventarc/trigger.py +95 -72
- pulumi_gcp/filestore/backup.py +4 -4
- pulumi_gcp/firebase/__init__.py +1 -0
- pulumi_gcp/firebase/data_connect_service.py +937 -0
- pulumi_gcp/gemini/__init__.py +4 -0
- pulumi_gcp/gemini/data_sharing_with_google_setting.py +607 -0
- pulumi_gcp/gemini/gemini_gcp_enablement_setting.py +608 -0
- pulumi_gcp/gemini/get_repository_group_iam_policy.py +2 -2
- pulumi_gcp/gemini/logging_setting.py +42 -54
- pulumi_gcp/gemini/logging_setting_binding.py +722 -0
- pulumi_gcp/gemini/release_channel_setting.py +39 -43
- pulumi_gcp/gemini/release_channel_setting_binding.py +734 -0
- pulumi_gcp/gkebackup/get_backup_plan_iam_policy.py +2 -2
- pulumi_gcp/gkebackup/get_restore_plan_iam_policy.py +2 -2
- pulumi_gcp/gkehub/get_feature_iam_policy.py +2 -2
- pulumi_gcp/gkehub/get_membership_iam_policy.py +2 -2
- pulumi_gcp/gkehub/get_scope_iam_policy.py +2 -2
- pulumi_gcp/healthcare/get_consent_store_iam_policy.py +2 -2
- pulumi_gcp/iap/get_app_engine_service_iam_policy.py +2 -2
- pulumi_gcp/iap/get_app_engine_version_iam_policy.py +2 -2
- pulumi_gcp/iap/get_tunnel_dest_group_iam_policy.py +2 -2
- pulumi_gcp/iap/get_tunnel_iam_policy.py +2 -2
- pulumi_gcp/iap/get_tunnel_instance_iam_policy.py +2 -2
- pulumi_gcp/iap/get_web_backend_service_iam_policy.py +2 -2
- pulumi_gcp/iap/get_web_iam_policy.py +2 -2
- pulumi_gcp/iap/get_web_region_backend_service_iam_policy.py +2 -2
- pulumi_gcp/iap/get_web_type_app_engine_iam_policy.py +2 -2
- pulumi_gcp/iap/get_web_type_compute_iam_policy.py +2 -2
- pulumi_gcp/kms/get_ekm_connection_iam_policy.py +2 -2
- pulumi_gcp/logging/get_log_view_iam_policy.py +2 -2
- pulumi_gcp/monitoring/_inputs.py +588 -0
- pulumi_gcp/monitoring/outputs.py +410 -0
- pulumi_gcp/netapp/__init__.py +1 -0
- pulumi_gcp/netapp/volume_quota_rule.py +895 -0
- pulumi_gcp/networksecurity/address_group_iam_binding.py +4 -4
- pulumi_gcp/networksecurity/address_group_iam_member.py +4 -4
- pulumi_gcp/networksecurity/address_group_iam_policy.py +4 -4
- pulumi_gcp/networkservices/authz_extension.py +8 -15
- pulumi_gcp/networkservices/mesh.py +79 -12
- pulumi_gcp/notebooks/get_instance_iam_policy.py +2 -2
- pulumi_gcp/notebooks/get_runtime_iam_policy.py +2 -2
- pulumi_gcp/provider.py +20 -0
- pulumi_gcp/pubsub/get_schema_iam_policy.py +2 -2
- pulumi_gcp/pubsub/get_topic_iam_policy.py +2 -2
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/runtimeconfig/get_config_iam_policy.py +20 -2
- pulumi_gcp/secretmanager/get_regional_secret_iam_policy.py +2 -2
- pulumi_gcp/secretmanager/get_secret_iam_policy.py +2 -2
- pulumi_gcp/securesourcemanager/get_instance_iam_policy.py +2 -2
- pulumi_gcp/securesourcemanager/get_repository_iam_policy.py +2 -2
- pulumi_gcp/securitycenter/get_source_iam_policy.py +2 -2
- pulumi_gcp/securitycenter/get_v2_organization_source_iam_policy.py +2 -2
- pulumi_gcp/securitycenter/mute_config.py +136 -3
- pulumi_gcp/securitycenter/v2_folder_notification_config.py +2 -14
- pulumi_gcp/securitycenter/v2_organization_notification_config.py +2 -14
- pulumi_gcp/securitycenter/v2_organization_source_iam_binding.py +8 -8
- pulumi_gcp/securitycenter/v2_organization_source_iam_member.py +8 -8
- pulumi_gcp/securitycenter/v2_organization_source_iam_policy.py +8 -8
- pulumi_gcp/securitycenter/v2_project_notification_config.py +2 -14
- pulumi_gcp/servicedirectory/get_namespace_iam_policy.py +18 -2
- pulumi_gcp/servicedirectory/get_service_iam_policy.py +18 -2
- pulumi_gcp/sourcerepo/get_repository_iam_policy.py +2 -2
- pulumi_gcp/spanner/instance.py +0 -46
- pulumi_gcp/sql/_inputs.py +6 -6
- pulumi_gcp/sql/outputs.py +4 -4
- pulumi_gcp/storage/bucket.py +30 -0
- pulumi_gcp/storage/get_bucket_iam_policy.py +2 -2
- pulumi_gcp/tags/get_tag_key_iam_policy.py +2 -2
- pulumi_gcp/tags/get_tag_value_iam_policy.py +2 -2
- pulumi_gcp/vertex/get_ai_endpoint_iam_policy.py +22 -2
- pulumi_gcp/vertex/get_ai_featurestore_entitytype_iam_policy.py +20 -2
- pulumi_gcp/vertex/get_ai_featurestore_iam_policy.py +22 -2
- pulumi_gcp/workbench/get_instance_iam_policy.py +2 -2
- pulumi_gcp/workstations/get_workstation_config_iam_policy.py +24 -2
- pulumi_gcp/workstations/get_workstation_iam_policy.py +26 -2
- {pulumi_gcp-8.20.0a1739946722.dist-info → pulumi_gcp-8.21.0a1740033009.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.20.0a1739946722.dist-info → pulumi_gcp-8.21.0a1740033009.dist-info}/RECORD +189 -182
- {pulumi_gcp-8.20.0a1739946722.dist-info → pulumi_gcp-8.21.0a1740033009.dist-info}/WHEEL +0 -0
- {pulumi_gcp-8.20.0a1739946722.dist-info → pulumi_gcp-8.21.0a1740033009.dist-info}/top_level.txt +0 -0
@@ -288,7 +288,7 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
288
288
|
taxonomy: Optional[pulumi.Input[str]] = None,
|
289
289
|
__props__=None):
|
290
290
|
"""
|
291
|
-
Three different resources help you manage your IAM policy for Data
|
291
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
292
292
|
|
293
293
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
294
294
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -345,8 +345,8 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
345
345
|
|
346
346
|
-
|
347
347
|
|
348
|
-
# IAM policy for Data
|
349
|
-
Three different resources help you manage your IAM policy for Data
|
348
|
+
# IAM policy for Data Catalog Taxonomy
|
349
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
350
350
|
|
351
351
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
352
352
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -413,7 +413,7 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
413
413
|
|
414
414
|
Any variables not passed in the import command will be taken from the provider configuration.
|
415
415
|
|
416
|
-
Data
|
416
|
+
Data Catalog taxonomy IAM resources can be imported using the resource identifiers, role, and member.
|
417
417
|
|
418
418
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
419
419
|
|
@@ -464,7 +464,7 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
464
464
|
args: TaxonomyIamBindingArgs,
|
465
465
|
opts: Optional[pulumi.ResourceOptions] = None):
|
466
466
|
"""
|
467
|
-
Three different resources help you manage your IAM policy for Data
|
467
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
468
468
|
|
469
469
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
470
470
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -521,8 +521,8 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
521
521
|
|
522
522
|
-
|
523
523
|
|
524
|
-
# IAM policy for Data
|
525
|
-
Three different resources help you manage your IAM policy for Data
|
524
|
+
# IAM policy for Data Catalog Taxonomy
|
525
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
526
526
|
|
527
527
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
528
528
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -589,7 +589,7 @@ class TaxonomyIamBinding(pulumi.CustomResource):
|
|
589
589
|
|
590
590
|
Any variables not passed in the import command will be taken from the provider configuration.
|
591
591
|
|
592
|
-
Data
|
592
|
+
Data Catalog taxonomy IAM resources can be imported using the resource identifiers, role, and member.
|
593
593
|
|
594
594
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
595
595
|
|
@@ -288,7 +288,7 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
288
288
|
taxonomy: Optional[pulumi.Input[str]] = None,
|
289
289
|
__props__=None):
|
290
290
|
"""
|
291
|
-
Three different resources help you manage your IAM policy for Data
|
291
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
292
292
|
|
293
293
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
294
294
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -345,8 +345,8 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
345
345
|
|
346
346
|
-
|
347
347
|
|
348
|
-
# IAM policy for Data
|
349
|
-
Three different resources help you manage your IAM policy for Data
|
348
|
+
# IAM policy for Data Catalog Taxonomy
|
349
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
350
350
|
|
351
351
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
352
352
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -413,7 +413,7 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
413
413
|
|
414
414
|
Any variables not passed in the import command will be taken from the provider configuration.
|
415
415
|
|
416
|
-
Data
|
416
|
+
Data Catalog taxonomy IAM resources can be imported using the resource identifiers, role, and member.
|
417
417
|
|
418
418
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
419
419
|
|
@@ -464,7 +464,7 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
464
464
|
args: TaxonomyIamMemberArgs,
|
465
465
|
opts: Optional[pulumi.ResourceOptions] = None):
|
466
466
|
"""
|
467
|
-
Three different resources help you manage your IAM policy for Data
|
467
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
468
468
|
|
469
469
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
470
470
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -521,8 +521,8 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
521
521
|
|
522
522
|
-
|
523
523
|
|
524
|
-
# IAM policy for Data
|
525
|
-
Three different resources help you manage your IAM policy for Data
|
524
|
+
# IAM policy for Data Catalog Taxonomy
|
525
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
526
526
|
|
527
527
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
528
528
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -589,7 +589,7 @@ class TaxonomyIamMember(pulumi.CustomResource):
|
|
589
589
|
|
590
590
|
Any variables not passed in the import command will be taken from the provider configuration.
|
591
591
|
|
592
|
-
Data
|
592
|
+
Data Catalog taxonomy IAM resources can be imported using the resource identifiers, role, and member.
|
593
593
|
|
594
594
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
595
595
|
|
@@ -185,7 +185,7 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
185
185
|
taxonomy: Optional[pulumi.Input[str]] = None,
|
186
186
|
__props__=None):
|
187
187
|
"""
|
188
|
-
Three different resources help you manage your IAM policy for Data
|
188
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
189
189
|
|
190
190
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
191
191
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -242,8 +242,8 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
242
242
|
|
243
243
|
-
|
244
244
|
|
245
|
-
# IAM policy for Data
|
246
|
-
Three different resources help you manage your IAM policy for Data
|
245
|
+
# IAM policy for Data Catalog Taxonomy
|
246
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
247
247
|
|
248
248
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
249
249
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -310,7 +310,7 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
310
310
|
|
311
311
|
Any variables not passed in the import command will be taken from the provider configuration.
|
312
312
|
|
313
|
-
Data
|
313
|
+
Data Catalog taxonomy IAM resources can be imported using the resource identifiers, role, and member.
|
314
314
|
|
315
315
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
316
316
|
|
@@ -349,7 +349,7 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
349
349
|
args: TaxonomyIamPolicyArgs,
|
350
350
|
opts: Optional[pulumi.ResourceOptions] = None):
|
351
351
|
"""
|
352
|
-
Three different resources help you manage your IAM policy for Data
|
352
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
353
353
|
|
354
354
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
355
355
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -406,8 +406,8 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
406
406
|
|
407
407
|
-
|
408
408
|
|
409
|
-
# IAM policy for Data
|
410
|
-
Three different resources help you manage your IAM policy for Data
|
409
|
+
# IAM policy for Data Catalog Taxonomy
|
410
|
+
Three different resources help you manage your IAM policy for Data Catalog Taxonomy. Each of these resources serves a different use case:
|
411
411
|
|
412
412
|
* `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
|
413
413
|
* `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
|
@@ -474,7 +474,7 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
|
|
474
474
|
|
475
475
|
Any variables not passed in the import command will be taken from the provider configuration.
|
476
476
|
|
477
|
-
Data
|
477
|
+
Data Catalog taxonomy IAM resources can be imported using the resource identifiers, role, and member.
|
478
478
|
|
479
479
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
480
480
|
|
@@ -106,7 +106,17 @@ def get_repository_iam_policy(project: Optional[str] = None,
|
|
106
106
|
repository: Optional[str] = None,
|
107
107
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetRepositoryIamPolicyResult:
|
108
108
|
"""
|
109
|
-
|
109
|
+
## Example Usage
|
110
|
+
|
111
|
+
```python
|
112
|
+
import pulumi
|
113
|
+
import pulumi_gcp as gcp
|
114
|
+
|
115
|
+
policy = gcp.dataform.get_repository_iam_policy(project=dataform_repository["project"],
|
116
|
+
region=dataform_repository["region"],
|
117
|
+
repository=dataform_repository["name"])
|
118
|
+
```
|
119
|
+
|
110
120
|
|
111
121
|
:param str project: The ID of the project in which the resource belongs.
|
112
122
|
If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
|
@@ -134,7 +144,17 @@ def get_repository_iam_policy_output(project: Optional[pulumi.Input[Optional[str
|
|
134
144
|
repository: Optional[pulumi.Input[str]] = None,
|
135
145
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetRepositoryIamPolicyResult]:
|
136
146
|
"""
|
137
|
-
|
147
|
+
## Example Usage
|
148
|
+
|
149
|
+
```python
|
150
|
+
import pulumi
|
151
|
+
import pulumi_gcp as gcp
|
152
|
+
|
153
|
+
policy = gcp.dataform.get_repository_iam_policy(project=dataform_repository["project"],
|
154
|
+
region=dataform_repository["region"],
|
155
|
+
repository=dataform_repository["name"])
|
156
|
+
```
|
157
|
+
|
138
158
|
|
139
159
|
:param str project: The ID of the project in which the resource belongs.
|
140
160
|
If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
|
@@ -108,7 +108,7 @@ def get_instance_iam_policy(name: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for instance
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -149,7 +149,7 @@ def get_instance_iam_policy_output(name: Optional[pulumi.Input[str]] = None,
|
|
149
149
|
"""
|
150
150
|
Retrieves the current IAM policy data for instance
|
151
151
|
|
152
|
-
##
|
152
|
+
## Example Usage
|
153
153
|
|
154
154
|
```python
|
155
155
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_aspect_type_iam_policy(aspect_type_id: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for aspecttype
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -148,7 +148,7 @@ def get_aspect_type_iam_policy_output(aspect_type_id: Optional[pulumi.Input[str]
|
|
148
148
|
"""
|
149
149
|
Retrieves the current IAM policy data for aspecttype
|
150
150
|
|
151
|
-
##
|
151
|
+
## Example Usage
|
152
152
|
|
153
153
|
```python
|
154
154
|
import pulumi
|
@@ -128,7 +128,7 @@ def get_asset_iam_policy(asset: Optional[str] = None,
|
|
128
128
|
"""
|
129
129
|
Retrieves the current IAM policy data for asset
|
130
130
|
|
131
|
-
##
|
131
|
+
## Example Usage
|
132
132
|
|
133
133
|
```python
|
134
134
|
import pulumi
|
@@ -173,7 +173,7 @@ def get_asset_iam_policy_output(asset: Optional[pulumi.Input[str]] = None,
|
|
173
173
|
"""
|
174
174
|
Retrieves the current IAM policy data for asset
|
175
175
|
|
176
|
-
##
|
176
|
+
## Example Usage
|
177
177
|
|
178
178
|
```python
|
179
179
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_datascan_iam_policy(data_scan_id: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for datascan
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -148,7 +148,7 @@ def get_datascan_iam_policy_output(data_scan_id: Optional[pulumi.Input[str]] = N
|
|
148
148
|
"""
|
149
149
|
Retrieves the current IAM policy data for datascan
|
150
150
|
|
151
|
-
##
|
151
|
+
## Example Usage
|
152
152
|
|
153
153
|
```python
|
154
154
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_entry_group_iam_policy(entry_group_id: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for entrygroup
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -148,7 +148,7 @@ def get_entry_group_iam_policy_output(entry_group_id: Optional[pulumi.Input[str]
|
|
148
148
|
"""
|
149
149
|
Retrieves the current IAM policy data for entrygroup
|
150
150
|
|
151
|
-
##
|
151
|
+
## Example Usage
|
152
152
|
|
153
153
|
```python
|
154
154
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_entry_type_iam_policy(entry_type_id: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for entrytype
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -148,7 +148,7 @@ def get_entry_type_iam_policy_output(entry_type_id: Optional[pulumi.Input[str]]
|
|
148
148
|
"""
|
149
149
|
Retrieves the current IAM policy data for entrytype
|
150
150
|
|
151
|
-
##
|
151
|
+
## Example Usage
|
152
152
|
|
153
153
|
```python
|
154
154
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_lake_iam_policy(lake: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for lake
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -145,7 +145,7 @@ def get_lake_iam_policy_output(lake: Optional[pulumi.Input[str]] = None,
|
|
145
145
|
"""
|
146
146
|
Retrieves the current IAM policy data for lake
|
147
147
|
|
148
|
-
##
|
148
|
+
## Example Usage
|
149
149
|
|
150
150
|
```python
|
151
151
|
import pulumi
|
@@ -118,7 +118,7 @@ def get_task_iam_policy(lake: Optional[str] = None,
|
|
118
118
|
"""
|
119
119
|
Retrieves the current IAM policy data for task
|
120
120
|
|
121
|
-
##
|
121
|
+
## Example Usage
|
122
122
|
|
123
123
|
```python
|
124
124
|
import pulumi
|
@@ -164,7 +164,7 @@ def get_task_iam_policy_output(lake: Optional[pulumi.Input[str]] = None,
|
|
164
164
|
"""
|
165
165
|
Retrieves the current IAM policy data for task
|
166
166
|
|
167
|
-
##
|
167
|
+
## Example Usage
|
168
168
|
|
169
169
|
```python
|
170
170
|
import pulumi
|
@@ -118,7 +118,7 @@ def get_zone_iam_policy(dataplex_zone: Optional[str] = None,
|
|
118
118
|
"""
|
119
119
|
Retrieves the current IAM policy data for zone
|
120
120
|
|
121
|
-
##
|
121
|
+
## Example Usage
|
122
122
|
|
123
123
|
```python
|
124
124
|
import pulumi
|
@@ -159,7 +159,7 @@ def get_zone_iam_policy_output(dataplex_zone: Optional[pulumi.Input[str]] = None
|
|
159
159
|
"""
|
160
160
|
Retrieves the current IAM policy data for zone
|
161
161
|
|
162
|
-
##
|
162
|
+
## Example Usage
|
163
163
|
|
164
164
|
```python
|
165
165
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_autoscaling_policy_iam_policy(location: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for autoscalingpolicy
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -153,7 +153,7 @@ def get_autoscaling_policy_iam_policy_output(location: Optional[pulumi.Input[Opt
|
|
153
153
|
"""
|
154
154
|
Retrieves the current IAM policy data for autoscalingpolicy
|
155
155
|
|
156
|
-
##
|
156
|
+
## Example Usage
|
157
157
|
|
158
158
|
```python
|
159
159
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_metastore_federation_iam_policy(federation_id: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for federation
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -148,7 +148,7 @@ def get_metastore_federation_iam_policy_output(federation_id: Optional[pulumi.In
|
|
148
148
|
"""
|
149
149
|
Retrieves the current IAM policy data for federation
|
150
150
|
|
151
|
-
##
|
151
|
+
## Example Usage
|
152
152
|
|
153
153
|
```python
|
154
154
|
import pulumi
|
@@ -108,7 +108,7 @@ def get_metastore_service_iam_policy(location: Optional[str] = None,
|
|
108
108
|
"""
|
109
109
|
Retrieves the current IAM policy data for service
|
110
110
|
|
111
|
-
##
|
111
|
+
## Example Usage
|
112
112
|
|
113
113
|
```python
|
114
114
|
import pulumi
|
@@ -149,7 +149,7 @@ def get_metastore_service_iam_policy_output(location: Optional[pulumi.Input[Opti
|
|
149
149
|
"""
|
150
150
|
Retrieves the current IAM policy data for service
|
151
151
|
|
152
|
-
##
|
152
|
+
## Example Usage
|
153
153
|
|
154
154
|
```python
|
155
155
|
import pulumi
|
@@ -300,7 +300,7 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
|
|
300
300
|
role: Optional[pulumi.Input[str]] = None,
|
301
301
|
__props__=None):
|
302
302
|
"""
|
303
|
-
Three different resources help you manage your IAM policy for Dataproc
|
303
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
304
304
|
|
305
305
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
306
306
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -363,8 +363,8 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
|
|
363
363
|
|
364
364
|
-
|
365
365
|
|
366
|
-
# IAM policy for Dataproc
|
367
|
-
Three different resources help you manage your IAM policy for Dataproc
|
366
|
+
# IAM policy for Dataproc Metastore Federation
|
367
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
368
368
|
|
369
369
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
370
370
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -437,7 +437,7 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
|
|
437
437
|
|
438
438
|
Any variables not passed in the import command will be taken from the provider configuration.
|
439
439
|
|
440
|
-
Dataproc
|
440
|
+
Dataproc Metastore federation IAM resources can be imported using the resource identifiers, role, and member.
|
441
441
|
|
442
442
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
443
443
|
|
@@ -491,7 +491,7 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
|
|
491
491
|
args: MetastoreFederationIamBindingArgs,
|
492
492
|
opts: Optional[pulumi.ResourceOptions] = None):
|
493
493
|
"""
|
494
|
-
Three different resources help you manage your IAM policy for Dataproc
|
494
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
495
495
|
|
496
496
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
497
497
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -554,8 +554,8 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
|
|
554
554
|
|
555
555
|
-
|
556
556
|
|
557
|
-
# IAM policy for Dataproc
|
558
|
-
Three different resources help you manage your IAM policy for Dataproc
|
557
|
+
# IAM policy for Dataproc Metastore Federation
|
558
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
559
559
|
|
560
560
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
561
561
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -628,7 +628,7 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
|
|
628
628
|
|
629
629
|
Any variables not passed in the import command will be taken from the provider configuration.
|
630
630
|
|
631
|
-
Dataproc
|
631
|
+
Dataproc Metastore federation IAM resources can be imported using the resource identifiers, role, and member.
|
632
632
|
|
633
633
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
634
634
|
|
@@ -300,7 +300,7 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
300
300
|
role: Optional[pulumi.Input[str]] = None,
|
301
301
|
__props__=None):
|
302
302
|
"""
|
303
|
-
Three different resources help you manage your IAM policy for Dataproc
|
303
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
304
304
|
|
305
305
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
306
306
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -363,8 +363,8 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
363
363
|
|
364
364
|
-
|
365
365
|
|
366
|
-
# IAM policy for Dataproc
|
367
|
-
Three different resources help you manage your IAM policy for Dataproc
|
366
|
+
# IAM policy for Dataproc Metastore Federation
|
367
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
368
368
|
|
369
369
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
370
370
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -437,7 +437,7 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
437
437
|
|
438
438
|
Any variables not passed in the import command will be taken from the provider configuration.
|
439
439
|
|
440
|
-
Dataproc
|
440
|
+
Dataproc Metastore federation IAM resources can be imported using the resource identifiers, role, and member.
|
441
441
|
|
442
442
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
443
443
|
|
@@ -491,7 +491,7 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
491
491
|
args: MetastoreFederationIamMemberArgs,
|
492
492
|
opts: Optional[pulumi.ResourceOptions] = None):
|
493
493
|
"""
|
494
|
-
Three different resources help you manage your IAM policy for Dataproc
|
494
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
495
495
|
|
496
496
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
497
497
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -554,8 +554,8 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
554
554
|
|
555
555
|
-
|
556
556
|
|
557
|
-
# IAM policy for Dataproc
|
558
|
-
Three different resources help you manage your IAM policy for Dataproc
|
557
|
+
# IAM policy for Dataproc Metastore Federation
|
558
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
559
559
|
|
560
560
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
561
561
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -628,7 +628,7 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
|
|
628
628
|
|
629
629
|
Any variables not passed in the import command will be taken from the provider configuration.
|
630
630
|
|
631
|
-
Dataproc
|
631
|
+
Dataproc Metastore federation IAM resources can be imported using the resource identifiers, role, and member.
|
632
632
|
|
633
633
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
634
634
|
|
@@ -197,7 +197,7 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
197
197
|
project: Optional[pulumi.Input[str]] = None,
|
198
198
|
__props__=None):
|
199
199
|
"""
|
200
|
-
Three different resources help you manage your IAM policy for Dataproc
|
200
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
201
201
|
|
202
202
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
203
203
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -260,8 +260,8 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
260
260
|
|
261
261
|
-
|
262
262
|
|
263
|
-
# IAM policy for Dataproc
|
264
|
-
Three different resources help you manage your IAM policy for Dataproc
|
263
|
+
# IAM policy for Dataproc Metastore Federation
|
264
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
265
265
|
|
266
266
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
267
267
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -334,7 +334,7 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
334
334
|
|
335
335
|
Any variables not passed in the import command will be taken from the provider configuration.
|
336
336
|
|
337
|
-
Dataproc
|
337
|
+
Dataproc Metastore federation IAM resources can be imported using the resource identifiers, role, and member.
|
338
338
|
|
339
339
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
340
340
|
|
@@ -376,7 +376,7 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
376
376
|
args: MetastoreFederationIamPolicyArgs,
|
377
377
|
opts: Optional[pulumi.ResourceOptions] = None):
|
378
378
|
"""
|
379
|
-
Three different resources help you manage your IAM policy for Dataproc
|
379
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
380
380
|
|
381
381
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
382
382
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -439,8 +439,8 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
439
439
|
|
440
440
|
-
|
441
441
|
|
442
|
-
# IAM policy for Dataproc
|
443
|
-
Three different resources help you manage your IAM policy for Dataproc
|
442
|
+
# IAM policy for Dataproc Metastore Federation
|
443
|
+
Three different resources help you manage your IAM policy for Dataproc Metastore Federation. Each of these resources serves a different use case:
|
444
444
|
|
445
445
|
* `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
|
446
446
|
* `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
|
@@ -513,7 +513,7 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
|
|
513
513
|
|
514
514
|
Any variables not passed in the import command will be taken from the provider configuration.
|
515
515
|
|
516
|
-
Dataproc
|
516
|
+
Dataproc Metastore federation IAM resources can be imported using the resource identifiers, role, and member.
|
517
517
|
|
518
518
|
IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
|
519
519
|
|