pulumi-gcp 8.42.0a1758178363__py3-none-any.whl → 9.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +83 -48
- pulumi_gcp/activedirectory/peering.py +16 -0
- pulumi_gcp/alloydb/backup.py +8 -4
- pulumi_gcp/alloydb/cluster.py +56 -10
- pulumi_gcp/alloydb/get_cluster.py +12 -1
- pulumi_gcp/alloydb/instance.py +10 -4
- pulumi_gcp/alloydb/user.py +8 -4
- pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
- pulumi_gcp/apigateway/api_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_iam_policy.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
- pulumi_gcp/apigee/_inputs.py +151 -108
- pulumi_gcp/apigee/keystores_aliases_key_cert_file.py +52 -40
- pulumi_gcp/apigee/outputs.py +92 -88
- pulumi_gcp/artifactregistry/__init__.py +2 -0
- pulumi_gcp/artifactregistry/_inputs.py +0 -12
- pulumi_gcp/artifactregistry/get_npm_package.py +251 -0
- pulumi_gcp/artifactregistry/get_python_package.py +237 -0
- pulumi_gcp/artifactregistry/get_repository.py +12 -1
- pulumi_gcp/artifactregistry/outputs.py +8 -16
- pulumi_gcp/artifactregistry/repository.py +28 -0
- pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
- pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
- pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
- pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
- pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
- pulumi_gcp/beyondcorp/__init__.py +0 -5
- pulumi_gcp/beyondcorp/_inputs.py +0 -312
- pulumi_gcp/beyondcorp/outputs.py +0 -200
- pulumi_gcp/bigquery/_inputs.py +114 -4
- pulumi_gcp/bigquery/app_profile.py +3 -5
- pulumi_gcp/bigquery/outputs.py +75 -5
- pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
- pulumi_gcp/bigtable/app_profile.py +1 -1
- pulumi_gcp/bigtable/get_table_iam_policy.py +16 -18
- pulumi_gcp/bigtable/table_iam_binding.py +43 -43
- pulumi_gcp/bigtable/table_iam_member.py +43 -43
- pulumi_gcp/bigtable/table_iam_policy.py +43 -43
- pulumi_gcp/billing/_inputs.py +0 -6
- pulumi_gcp/billing/outputs.py +0 -4
- pulumi_gcp/certificatemanager/__init__.py +1 -0
- pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
- pulumi_gcp/certificatemanager/get_dns_authorization.py +229 -0
- pulumi_gcp/certificatemanager/outputs.py +41 -0
- pulumi_gcp/chronicle/_inputs.py +6 -5
- pulumi_gcp/chronicle/outputs.py +4 -3
- pulumi_gcp/chronicle/reference_list.py +53 -5
- pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
- pulumi_gcp/cloudbuild/_inputs.py +309 -45
- pulumi_gcp/cloudbuild/bitbucket_server_config.py +2 -6
- pulumi_gcp/cloudbuild/get_trigger.py +12 -1
- pulumi_gcp/cloudbuild/outputs.py +380 -30
- pulumi_gcp/cloudbuild/trigger.py +160 -2
- pulumi_gcp/cloudbuild/worker_pool.py +2 -6
- pulumi_gcp/cloudfunctionsv2/_inputs.py +23 -21
- pulumi_gcp/cloudfunctionsv2/outputs.py +17 -16
- pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
- pulumi_gcp/cloudrunv2/_inputs.py +80 -26
- pulumi_gcp/cloudrunv2/get_service.py +12 -1
- pulumi_gcp/cloudrunv2/outputs.py +109 -30
- pulumi_gcp/cloudrunv2/service.py +72 -12
- pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
- pulumi_gcp/cloudtasks/queue.py +98 -2
- pulumi_gcp/colab/_inputs.py +1 -114
- pulumi_gcp/colab/outputs.py +1 -106
- pulumi_gcp/compute/_inputs.py +884 -24
- pulumi_gcp/compute/backend_bucket.py +68 -0
- pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
- pulumi_gcp/compute/backend_service.py +54 -0
- pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
- pulumi_gcp/compute/backend_service_iam_member.py +464 -0
- pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
- pulumi_gcp/compute/cross_site_network.py +16 -0
- pulumi_gcp/compute/future_reservation.py +32 -0
- pulumi_gcp/compute/get_backend_bucket.py +12 -1
- pulumi_gcp/compute/get_backend_service.py +12 -1
- pulumi_gcp/compute/get_region_backend_service.py +12 -1
- pulumi_gcp/compute/get_resource_policy.py +2 -20
- pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
- pulumi_gcp/compute/machine_image_iam_member.py +8 -4
- pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
- pulumi_gcp/compute/network_edge_security_service.py +16 -0
- pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
- pulumi_gcp/compute/network_peering_routes_config.py +0 -100
- pulumi_gcp/compute/organization_security_policy.py +83 -51
- pulumi_gcp/compute/outputs.py +799 -16
- pulumi_gcp/compute/packet_mirroring.py +6 -0
- pulumi_gcp/compute/preview_feature.py +16 -0
- pulumi_gcp/compute/public_delegated_prefix.py +42 -0
- pulumi_gcp/compute/region_backend_service.py +54 -0
- pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
- pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
- pulumi_gcp/compute/region_resize_request.py +24 -0
- pulumi_gcp/compute/region_url_map.py +75 -0
- pulumi_gcp/compute/subnetwork.py +0 -98
- pulumi_gcp/compute/wire_group.py +16 -0
- pulumi_gcp/config/__init__.pyi +2 -2
- pulumi_gcp/config/vars.py +4 -4
- pulumi_gcp/container/_inputs.py +466 -18
- pulumi_gcp/container/cluster.py +16 -7
- pulumi_gcp/container/outputs.py +448 -15
- pulumi_gcp/databasemigrationservice/connection_profile.py +4 -2
- pulumi_gcp/databasemigrationservice/migration_job.py +4 -2
- pulumi_gcp/dataflow/flex_template_job.py +10 -0
- pulumi_gcp/dataform/repository.py +16 -0
- pulumi_gcp/dataform/repository_release_config.py +16 -0
- pulumi_gcp/dataform/repository_workflow_config.py +16 -0
- pulumi_gcp/diagflow/_inputs.py +152 -0
- pulumi_gcp/diagflow/cx_agent.py +425 -0
- pulumi_gcp/diagflow/outputs.py +143 -0
- pulumi_gcp/discoveryengine/__init__.py +1 -0
- pulumi_gcp/discoveryengine/_inputs.py +94 -0
- pulumi_gcp/discoveryengine/acl_config.py +393 -0
- pulumi_gcp/discoveryengine/outputs.py +92 -0
- pulumi_gcp/firebase/android_app.py +16 -0
- pulumi_gcp/firebase/app_check_play_integrity_config.py +4 -8
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +2 -4
- pulumi_gcp/firebase/app_check_service_config.py +6 -12
- pulumi_gcp/firebase/app_hosting_backend.py +4 -8
- pulumi_gcp/firebase/app_hosting_build.py +4 -8
- pulumi_gcp/firebase/app_hosting_traffic.py +6 -12
- pulumi_gcp/firebase/apple_app.py +16 -0
- pulumi_gcp/firebase/data_connect_service.py +4 -8
- pulumi_gcp/firebase/database_instance.py +20 -8
- pulumi_gcp/firebase/extensions_instance.py +12 -0
- pulumi_gcp/firebase/get_android_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app_config.py +16 -2
- pulumi_gcp/firebase/get_hosting_channel.py +4 -2
- pulumi_gcp/firebase/hosting_channel.py +20 -0
- pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
- pulumi_gcp/firebase/hosting_release.py +16 -0
- pulumi_gcp/firebase/hosting_site.py +16 -0
- pulumi_gcp/firebase/hosting_version.py +16 -0
- pulumi_gcp/firebase/storage_bucket.py +18 -0
- pulumi_gcp/firestore/index.py +118 -3
- pulumi_gcp/folder/service_identity.py +26 -0
- pulumi_gcp/gkehub/_inputs.py +0 -60
- pulumi_gcp/gkehub/get_membership.py +1 -12
- pulumi_gcp/gkehub/membership.py +0 -70
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
- pulumi_gcp/gkehub/outputs.py +0 -36
- pulumi_gcp/healthcare/_inputs.py +205 -0
- pulumi_gcp/healthcare/fhir_store.py +128 -0
- pulumi_gcp/healthcare/outputs.py +163 -0
- pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
- pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
- pulumi_gcp/iap/__init__.py +8 -0
- pulumi_gcp/iap/_inputs.py +260 -0
- pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
- pulumi_gcp/iap/get_web_region_forwarding_rule_service_iam_policy.py +182 -0
- pulumi_gcp/iap/outputs.py +152 -0
- pulumi_gcp/{beyondcorp/application_iam_binding.py → iap/web_forwarding_rule_service_iam_binding.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_member.py → iap/web_forwarding_rule_service_iam_member.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_policy.py → iap/web_forwarding_rule_service_iam_policy.py} +212 -294
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_binding.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_member.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_policy.py +910 -0
- pulumi_gcp/kms/autokey_config.py +0 -2
- pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
- pulumi_gcp/kms/key_handle.py +0 -2
- pulumi_gcp/logging/organization_sink.py +7 -7
- pulumi_gcp/managedkafka/connect_cluster.py +4 -0
- pulumi_gcp/managedkafka/connector.py +4 -0
- pulumi_gcp/memorystore/get_instance.py +1 -12
- pulumi_gcp/memorystore/instance.py +14 -84
- pulumi_gcp/netapp/storage_pool.py +91 -2
- pulumi_gcp/netapp/volume.py +47 -0
- pulumi_gcp/networkmanagement/__init__.py +1 -0
- pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
- pulumi_gcp/networksecurity/authorization_policy.py +12 -0
- pulumi_gcp/networkservices/gateway.py +7 -7
- pulumi_gcp/networkservices/lb_traffic_extension.py +24 -23
- pulumi_gcp/networkservices/service_lb_policies.py +12 -0
- pulumi_gcp/notebooks/__init__.py +0 -1
- pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
- pulumi_gcp/oracledatabase/cloud_vm_cluster.py +3 -3
- pulumi_gcp/projects/service.py +2 -11
- pulumi_gcp/provider.py +20 -20
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/cluster.py +0 -70
- pulumi_gcp/redis/get_cluster.py +1 -12
- pulumi_gcp/resourcemanager/capability.py +16 -0
- pulumi_gcp/runtimeconfig/config.py +16 -0
- pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
- pulumi_gcp/runtimeconfig/variable.py +10 -0
- pulumi_gcp/saasruntime/__init__.py +12 -0
- pulumi_gcp/saasruntime/_inputs.py +513 -0
- pulumi_gcp/saasruntime/outputs.py +431 -0
- pulumi_gcp/saasruntime/saa_s.py +819 -0
- pulumi_gcp/saasruntime/unit_kind.py +1024 -0
- pulumi_gcp/securesourcemanager/_inputs.py +20 -19
- pulumi_gcp/securesourcemanager/instance.py +7 -7
- pulumi_gcp/securesourcemanager/outputs.py +15 -14
- pulumi_gcp/securesourcemanager/repository.py +7 -7
- pulumi_gcp/serviceaccount/get_account_key.py +1 -21
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
- pulumi_gcp/sql/_inputs.py +135 -1
- pulumi_gcp/sql/database_instance.py +94 -0
- pulumi_gcp/sql/get_database_instance.py +23 -1
- pulumi_gcp/sql/outputs.py +276 -3
- pulumi_gcp/sql/user.py +61 -0
- pulumi_gcp/storage/_inputs.py +253 -7
- pulumi_gcp/storage/bucket_object.py +0 -9
- pulumi_gcp/storage/outputs.py +198 -8
- pulumi_gcp/storage/transfer_job.py +47 -0
- pulumi_gcp/tpu/__init__.py +0 -2
- pulumi_gcp/tpu/_inputs.py +0 -93
- pulumi_gcp/tpu/outputs.py +0 -72
- pulumi_gcp/tpu/v2_queued_resource.py +16 -0
- pulumi_gcp/tpu/v2_vm.py +16 -0
- pulumi_gcp/vertex/_inputs.py +8 -9
- pulumi_gcp/vertex/ai_endpoint.py +2 -4
- pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +0 -2
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_index.py +24 -23
- pulumi_gcp/vertex/ai_metadata_store.py +16 -0
- pulumi_gcp/vertex/outputs.py +7 -8
- pulumi_gcp/workstations/workstation.py +16 -0
- pulumi_gcp/workstations/workstation_cluster.py +16 -0
- pulumi_gcp/workstations/workstation_config.py +16 -0
- pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
- pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
- pulumi_gcp/workstations/workstation_iam_member.py +272 -0
- pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/RECORD +266 -255
- pulumi_gcp/beyondcorp/application.py +0 -746
- pulumi_gcp/beyondcorp/get_application_iam_policy.py +0 -182
- pulumi_gcp/notebooks/location.py +0 -285
- pulumi_gcp/tpu/get_tensorflow_versions.py +0 -184
- pulumi_gcp/tpu/node.py +0 -1062
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/WHEEL +0 -0
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/top_level.txt +0 -0
@@ -264,6 +264,124 @@ class ConfigIamMember(pulumi.CustomResource):
|
|
264
264
|
role: Optional[pulumi.Input[_builtins.str]] = None,
|
265
265
|
__props__=None):
|
266
266
|
"""
|
267
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
268
|
+
|
269
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
270
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
271
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
272
|
+
|
273
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
274
|
+
|
275
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
276
|
+
|
277
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
278
|
+
|
279
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
280
|
+
|
281
|
+
## runtimeconfig.ConfigIamPolicy
|
282
|
+
|
283
|
+
```python
|
284
|
+
import pulumi
|
285
|
+
import pulumi_gcp as gcp
|
286
|
+
|
287
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
288
|
+
"role": "roles/viewer",
|
289
|
+
"members": ["user:jane@example.com"],
|
290
|
+
}])
|
291
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
292
|
+
project=config["project"],
|
293
|
+
config=config["name"],
|
294
|
+
policy_data=admin.policy_data)
|
295
|
+
```
|
296
|
+
|
297
|
+
## runtimeconfig.ConfigIamBinding
|
298
|
+
|
299
|
+
```python
|
300
|
+
import pulumi
|
301
|
+
import pulumi_gcp as gcp
|
302
|
+
|
303
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
304
|
+
project=config["project"],
|
305
|
+
config=config["name"],
|
306
|
+
role="roles/viewer",
|
307
|
+
members=["user:jane@example.com"])
|
308
|
+
```
|
309
|
+
|
310
|
+
## runtimeconfig.ConfigIamMember
|
311
|
+
|
312
|
+
```python
|
313
|
+
import pulumi
|
314
|
+
import pulumi_gcp as gcp
|
315
|
+
|
316
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
317
|
+
project=config["project"],
|
318
|
+
config=config["name"],
|
319
|
+
role="roles/viewer",
|
320
|
+
member="user:jane@example.com")
|
321
|
+
```
|
322
|
+
|
323
|
+
## This resource supports User Project Overrides.
|
324
|
+
|
325
|
+
-
|
326
|
+
|
327
|
+
# IAM policy for Runtime Configurator Config
|
328
|
+
|
329
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
330
|
+
|
331
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
332
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
333
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
334
|
+
|
335
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
336
|
+
|
337
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
338
|
+
|
339
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
340
|
+
|
341
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
342
|
+
|
343
|
+
## runtimeconfig.ConfigIamPolicy
|
344
|
+
|
345
|
+
```python
|
346
|
+
import pulumi
|
347
|
+
import pulumi_gcp as gcp
|
348
|
+
|
349
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
350
|
+
"role": "roles/viewer",
|
351
|
+
"members": ["user:jane@example.com"],
|
352
|
+
}])
|
353
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
354
|
+
project=config["project"],
|
355
|
+
config=config["name"],
|
356
|
+
policy_data=admin.policy_data)
|
357
|
+
```
|
358
|
+
|
359
|
+
## runtimeconfig.ConfigIamBinding
|
360
|
+
|
361
|
+
```python
|
362
|
+
import pulumi
|
363
|
+
import pulumi_gcp as gcp
|
364
|
+
|
365
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
366
|
+
project=config["project"],
|
367
|
+
config=config["name"],
|
368
|
+
role="roles/viewer",
|
369
|
+
members=["user:jane@example.com"])
|
370
|
+
```
|
371
|
+
|
372
|
+
## runtimeconfig.ConfigIamMember
|
373
|
+
|
374
|
+
```python
|
375
|
+
import pulumi
|
376
|
+
import pulumi_gcp as gcp
|
377
|
+
|
378
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
379
|
+
project=config["project"],
|
380
|
+
config=config["name"],
|
381
|
+
role="roles/viewer",
|
382
|
+
member="user:jane@example.com")
|
383
|
+
```
|
384
|
+
|
267
385
|
## Import
|
268
386
|
|
269
387
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -327,6 +445,124 @@ class ConfigIamMember(pulumi.CustomResource):
|
|
327
445
|
args: ConfigIamMemberArgs,
|
328
446
|
opts: Optional[pulumi.ResourceOptions] = None):
|
329
447
|
"""
|
448
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
449
|
+
|
450
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
451
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
452
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
453
|
+
|
454
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
455
|
+
|
456
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
457
|
+
|
458
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
459
|
+
|
460
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
461
|
+
|
462
|
+
## runtimeconfig.ConfigIamPolicy
|
463
|
+
|
464
|
+
```python
|
465
|
+
import pulumi
|
466
|
+
import pulumi_gcp as gcp
|
467
|
+
|
468
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
469
|
+
"role": "roles/viewer",
|
470
|
+
"members": ["user:jane@example.com"],
|
471
|
+
}])
|
472
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
473
|
+
project=config["project"],
|
474
|
+
config=config["name"],
|
475
|
+
policy_data=admin.policy_data)
|
476
|
+
```
|
477
|
+
|
478
|
+
## runtimeconfig.ConfigIamBinding
|
479
|
+
|
480
|
+
```python
|
481
|
+
import pulumi
|
482
|
+
import pulumi_gcp as gcp
|
483
|
+
|
484
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
485
|
+
project=config["project"],
|
486
|
+
config=config["name"],
|
487
|
+
role="roles/viewer",
|
488
|
+
members=["user:jane@example.com"])
|
489
|
+
```
|
490
|
+
|
491
|
+
## runtimeconfig.ConfigIamMember
|
492
|
+
|
493
|
+
```python
|
494
|
+
import pulumi
|
495
|
+
import pulumi_gcp as gcp
|
496
|
+
|
497
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
498
|
+
project=config["project"],
|
499
|
+
config=config["name"],
|
500
|
+
role="roles/viewer",
|
501
|
+
member="user:jane@example.com")
|
502
|
+
```
|
503
|
+
|
504
|
+
## This resource supports User Project Overrides.
|
505
|
+
|
506
|
+
-
|
507
|
+
|
508
|
+
# IAM policy for Runtime Configurator Config
|
509
|
+
|
510
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
511
|
+
|
512
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
513
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
514
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
515
|
+
|
516
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
517
|
+
|
518
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
519
|
+
|
520
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
521
|
+
|
522
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
523
|
+
|
524
|
+
## runtimeconfig.ConfigIamPolicy
|
525
|
+
|
526
|
+
```python
|
527
|
+
import pulumi
|
528
|
+
import pulumi_gcp as gcp
|
529
|
+
|
530
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
531
|
+
"role": "roles/viewer",
|
532
|
+
"members": ["user:jane@example.com"],
|
533
|
+
}])
|
534
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
535
|
+
project=config["project"],
|
536
|
+
config=config["name"],
|
537
|
+
policy_data=admin.policy_data)
|
538
|
+
```
|
539
|
+
|
540
|
+
## runtimeconfig.ConfigIamBinding
|
541
|
+
|
542
|
+
```python
|
543
|
+
import pulumi
|
544
|
+
import pulumi_gcp as gcp
|
545
|
+
|
546
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
547
|
+
project=config["project"],
|
548
|
+
config=config["name"],
|
549
|
+
role="roles/viewer",
|
550
|
+
members=["user:jane@example.com"])
|
551
|
+
```
|
552
|
+
|
553
|
+
## runtimeconfig.ConfigIamMember
|
554
|
+
|
555
|
+
```python
|
556
|
+
import pulumi
|
557
|
+
import pulumi_gcp as gcp
|
558
|
+
|
559
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
560
|
+
project=config["project"],
|
561
|
+
config=config["name"],
|
562
|
+
role="roles/viewer",
|
563
|
+
member="user:jane@example.com")
|
564
|
+
```
|
565
|
+
|
330
566
|
## Import
|
331
567
|
|
332
568
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -161,6 +161,124 @@ class ConfigIamPolicy(pulumi.CustomResource):
|
|
161
161
|
project: Optional[pulumi.Input[_builtins.str]] = None,
|
162
162
|
__props__=None):
|
163
163
|
"""
|
164
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
165
|
+
|
166
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
167
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
168
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
169
|
+
|
170
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
171
|
+
|
172
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
173
|
+
|
174
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
175
|
+
|
176
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
177
|
+
|
178
|
+
## runtimeconfig.ConfigIamPolicy
|
179
|
+
|
180
|
+
```python
|
181
|
+
import pulumi
|
182
|
+
import pulumi_gcp as gcp
|
183
|
+
|
184
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
185
|
+
"role": "roles/viewer",
|
186
|
+
"members": ["user:jane@example.com"],
|
187
|
+
}])
|
188
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
189
|
+
project=config["project"],
|
190
|
+
config=config["name"],
|
191
|
+
policy_data=admin.policy_data)
|
192
|
+
```
|
193
|
+
|
194
|
+
## runtimeconfig.ConfigIamBinding
|
195
|
+
|
196
|
+
```python
|
197
|
+
import pulumi
|
198
|
+
import pulumi_gcp as gcp
|
199
|
+
|
200
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
201
|
+
project=config["project"],
|
202
|
+
config=config["name"],
|
203
|
+
role="roles/viewer",
|
204
|
+
members=["user:jane@example.com"])
|
205
|
+
```
|
206
|
+
|
207
|
+
## runtimeconfig.ConfigIamMember
|
208
|
+
|
209
|
+
```python
|
210
|
+
import pulumi
|
211
|
+
import pulumi_gcp as gcp
|
212
|
+
|
213
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
214
|
+
project=config["project"],
|
215
|
+
config=config["name"],
|
216
|
+
role="roles/viewer",
|
217
|
+
member="user:jane@example.com")
|
218
|
+
```
|
219
|
+
|
220
|
+
## This resource supports User Project Overrides.
|
221
|
+
|
222
|
+
-
|
223
|
+
|
224
|
+
# IAM policy for Runtime Configurator Config
|
225
|
+
|
226
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
227
|
+
|
228
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
229
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
230
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
231
|
+
|
232
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
233
|
+
|
234
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
235
|
+
|
236
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
237
|
+
|
238
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
239
|
+
|
240
|
+
## runtimeconfig.ConfigIamPolicy
|
241
|
+
|
242
|
+
```python
|
243
|
+
import pulumi
|
244
|
+
import pulumi_gcp as gcp
|
245
|
+
|
246
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
247
|
+
"role": "roles/viewer",
|
248
|
+
"members": ["user:jane@example.com"],
|
249
|
+
}])
|
250
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
251
|
+
project=config["project"],
|
252
|
+
config=config["name"],
|
253
|
+
policy_data=admin.policy_data)
|
254
|
+
```
|
255
|
+
|
256
|
+
## runtimeconfig.ConfigIamBinding
|
257
|
+
|
258
|
+
```python
|
259
|
+
import pulumi
|
260
|
+
import pulumi_gcp as gcp
|
261
|
+
|
262
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
263
|
+
project=config["project"],
|
264
|
+
config=config["name"],
|
265
|
+
role="roles/viewer",
|
266
|
+
members=["user:jane@example.com"])
|
267
|
+
```
|
268
|
+
|
269
|
+
## runtimeconfig.ConfigIamMember
|
270
|
+
|
271
|
+
```python
|
272
|
+
import pulumi
|
273
|
+
import pulumi_gcp as gcp
|
274
|
+
|
275
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
276
|
+
project=config["project"],
|
277
|
+
config=config["name"],
|
278
|
+
role="roles/viewer",
|
279
|
+
member="user:jane@example.com")
|
280
|
+
```
|
281
|
+
|
164
282
|
## Import
|
165
283
|
|
166
284
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -212,6 +330,124 @@ class ConfigIamPolicy(pulumi.CustomResource):
|
|
212
330
|
args: ConfigIamPolicyArgs,
|
213
331
|
opts: Optional[pulumi.ResourceOptions] = None):
|
214
332
|
"""
|
333
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
334
|
+
|
335
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
336
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
337
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
338
|
+
|
339
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
340
|
+
|
341
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
342
|
+
|
343
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
344
|
+
|
345
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
346
|
+
|
347
|
+
## runtimeconfig.ConfigIamPolicy
|
348
|
+
|
349
|
+
```python
|
350
|
+
import pulumi
|
351
|
+
import pulumi_gcp as gcp
|
352
|
+
|
353
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
354
|
+
"role": "roles/viewer",
|
355
|
+
"members": ["user:jane@example.com"],
|
356
|
+
}])
|
357
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
358
|
+
project=config["project"],
|
359
|
+
config=config["name"],
|
360
|
+
policy_data=admin.policy_data)
|
361
|
+
```
|
362
|
+
|
363
|
+
## runtimeconfig.ConfigIamBinding
|
364
|
+
|
365
|
+
```python
|
366
|
+
import pulumi
|
367
|
+
import pulumi_gcp as gcp
|
368
|
+
|
369
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
370
|
+
project=config["project"],
|
371
|
+
config=config["name"],
|
372
|
+
role="roles/viewer",
|
373
|
+
members=["user:jane@example.com"])
|
374
|
+
```
|
375
|
+
|
376
|
+
## runtimeconfig.ConfigIamMember
|
377
|
+
|
378
|
+
```python
|
379
|
+
import pulumi
|
380
|
+
import pulumi_gcp as gcp
|
381
|
+
|
382
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
383
|
+
project=config["project"],
|
384
|
+
config=config["name"],
|
385
|
+
role="roles/viewer",
|
386
|
+
member="user:jane@example.com")
|
387
|
+
```
|
388
|
+
|
389
|
+
## This resource supports User Project Overrides.
|
390
|
+
|
391
|
+
-
|
392
|
+
|
393
|
+
# IAM policy for Runtime Configurator Config
|
394
|
+
|
395
|
+
Three different resources help you manage your IAM policy for Runtime Configurator Config. Each of these resources serves a different use case:
|
396
|
+
|
397
|
+
* `runtimeconfig.ConfigIamPolicy`: Authoritative. Sets the IAM policy for the config and replaces any existing policy already attached.
|
398
|
+
* `runtimeconfig.ConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the config are preserved.
|
399
|
+
* `runtimeconfig.ConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the config are preserved.
|
400
|
+
|
401
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
402
|
+
|
403
|
+
* `runtimeconfig.ConfigIamPolicy`: Retrieves the IAM policy for the config
|
404
|
+
|
405
|
+
> **Note:** `runtimeconfig.ConfigIamPolicy` **cannot** be used in conjunction with `runtimeconfig.ConfigIamBinding` and `runtimeconfig.ConfigIamMember` or they will fight over what your policy should be.
|
406
|
+
|
407
|
+
> **Note:** `runtimeconfig.ConfigIamBinding` resources **can be** used in conjunction with `runtimeconfig.ConfigIamMember` resources **only if** they do not grant privilege to the same role.
|
408
|
+
|
409
|
+
## runtimeconfig.ConfigIamPolicy
|
410
|
+
|
411
|
+
```python
|
412
|
+
import pulumi
|
413
|
+
import pulumi_gcp as gcp
|
414
|
+
|
415
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
416
|
+
"role": "roles/viewer",
|
417
|
+
"members": ["user:jane@example.com"],
|
418
|
+
}])
|
419
|
+
policy = gcp.runtimeconfig.ConfigIamPolicy("policy",
|
420
|
+
project=config["project"],
|
421
|
+
config=config["name"],
|
422
|
+
policy_data=admin.policy_data)
|
423
|
+
```
|
424
|
+
|
425
|
+
## runtimeconfig.ConfigIamBinding
|
426
|
+
|
427
|
+
```python
|
428
|
+
import pulumi
|
429
|
+
import pulumi_gcp as gcp
|
430
|
+
|
431
|
+
binding = gcp.runtimeconfig.ConfigIamBinding("binding",
|
432
|
+
project=config["project"],
|
433
|
+
config=config["name"],
|
434
|
+
role="roles/viewer",
|
435
|
+
members=["user:jane@example.com"])
|
436
|
+
```
|
437
|
+
|
438
|
+
## runtimeconfig.ConfigIamMember
|
439
|
+
|
440
|
+
```python
|
441
|
+
import pulumi
|
442
|
+
import pulumi_gcp as gcp
|
443
|
+
|
444
|
+
member = gcp.runtimeconfig.ConfigIamMember("member",
|
445
|
+
project=config["project"],
|
446
|
+
config=config["name"],
|
447
|
+
role="roles/viewer",
|
448
|
+
member="user:jane@example.com")
|
449
|
+
```
|
450
|
+
|
215
451
|
## Import
|
216
452
|
|
217
453
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -248,6 +248,11 @@ class Variable(pulumi.CustomResource):
|
|
248
248
|
value: Optional[pulumi.Input[_builtins.str]] = None,
|
249
249
|
__props__=None):
|
250
250
|
"""
|
251
|
+
Manages a RuntimeConfig variable in Google Cloud. For more information, see the
|
252
|
+
[official documentation](https://cloud.google.com/deployment-manager/runtime-configurator/),
|
253
|
+
or the
|
254
|
+
[JSON API](https://cloud.google.com/deployment-manager/runtime-configurator/reference/rest/).
|
255
|
+
|
251
256
|
## Example Usage
|
252
257
|
|
253
258
|
Example creating a RuntimeConfig variable.
|
@@ -326,6 +331,11 @@ class Variable(pulumi.CustomResource):
|
|
326
331
|
args: VariableArgs,
|
327
332
|
opts: Optional[pulumi.ResourceOptions] = None):
|
328
333
|
"""
|
334
|
+
Manages a RuntimeConfig variable in Google Cloud. For more information, see the
|
335
|
+
[official documentation](https://cloud.google.com/deployment-manager/runtime-configurator/),
|
336
|
+
or the
|
337
|
+
[JSON API](https://cloud.google.com/deployment-manager/runtime-configurator/reference/rest/).
|
338
|
+
|
329
339
|
## Example Usage
|
330
340
|
|
331
341
|
Example creating a RuntimeConfig variable.
|
@@ -0,0 +1,12 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import builtins as _builtins
|
6
|
+
from .. import _utilities
|
7
|
+
import typing
|
8
|
+
# Export this package's modules as members:
|
9
|
+
from .saa_s import *
|
10
|
+
from .unit_kind import *
|
11
|
+
from ._inputs import *
|
12
|
+
from . import outputs
|