pulumi-gcp 8.42.0a1758178363__py3-none-any.whl → 9.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +83 -48
- pulumi_gcp/activedirectory/peering.py +16 -0
- pulumi_gcp/alloydb/backup.py +8 -4
- pulumi_gcp/alloydb/cluster.py +56 -10
- pulumi_gcp/alloydb/get_cluster.py +12 -1
- pulumi_gcp/alloydb/instance.py +10 -4
- pulumi_gcp/alloydb/user.py +8 -4
- pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
- pulumi_gcp/apigateway/api_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_iam_policy.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
- pulumi_gcp/apigee/_inputs.py +151 -108
- pulumi_gcp/apigee/keystores_aliases_key_cert_file.py +52 -40
- pulumi_gcp/apigee/outputs.py +92 -88
- pulumi_gcp/artifactregistry/__init__.py +2 -0
- pulumi_gcp/artifactregistry/_inputs.py +0 -12
- pulumi_gcp/artifactregistry/get_npm_package.py +251 -0
- pulumi_gcp/artifactregistry/get_python_package.py +237 -0
- pulumi_gcp/artifactregistry/get_repository.py +12 -1
- pulumi_gcp/artifactregistry/outputs.py +8 -16
- pulumi_gcp/artifactregistry/repository.py +28 -0
- pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
- pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
- pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
- pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
- pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
- pulumi_gcp/beyondcorp/__init__.py +0 -5
- pulumi_gcp/beyondcorp/_inputs.py +0 -312
- pulumi_gcp/beyondcorp/outputs.py +0 -200
- pulumi_gcp/bigquery/_inputs.py +114 -4
- pulumi_gcp/bigquery/app_profile.py +3 -5
- pulumi_gcp/bigquery/outputs.py +75 -5
- pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
- pulumi_gcp/bigtable/app_profile.py +1 -1
- pulumi_gcp/bigtable/get_table_iam_policy.py +16 -18
- pulumi_gcp/bigtable/table_iam_binding.py +43 -43
- pulumi_gcp/bigtable/table_iam_member.py +43 -43
- pulumi_gcp/bigtable/table_iam_policy.py +43 -43
- pulumi_gcp/billing/_inputs.py +0 -6
- pulumi_gcp/billing/outputs.py +0 -4
- pulumi_gcp/certificatemanager/__init__.py +1 -0
- pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
- pulumi_gcp/certificatemanager/get_dns_authorization.py +229 -0
- pulumi_gcp/certificatemanager/outputs.py +41 -0
- pulumi_gcp/chronicle/_inputs.py +6 -5
- pulumi_gcp/chronicle/outputs.py +4 -3
- pulumi_gcp/chronicle/reference_list.py +53 -5
- pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
- pulumi_gcp/cloudbuild/_inputs.py +309 -45
- pulumi_gcp/cloudbuild/bitbucket_server_config.py +2 -6
- pulumi_gcp/cloudbuild/get_trigger.py +12 -1
- pulumi_gcp/cloudbuild/outputs.py +380 -30
- pulumi_gcp/cloudbuild/trigger.py +160 -2
- pulumi_gcp/cloudbuild/worker_pool.py +2 -6
- pulumi_gcp/cloudfunctionsv2/_inputs.py +23 -21
- pulumi_gcp/cloudfunctionsv2/outputs.py +17 -16
- pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
- pulumi_gcp/cloudrunv2/_inputs.py +80 -26
- pulumi_gcp/cloudrunv2/get_service.py +12 -1
- pulumi_gcp/cloudrunv2/outputs.py +109 -30
- pulumi_gcp/cloudrunv2/service.py +72 -12
- pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
- pulumi_gcp/cloudtasks/queue.py +98 -2
- pulumi_gcp/colab/_inputs.py +1 -114
- pulumi_gcp/colab/outputs.py +1 -106
- pulumi_gcp/compute/_inputs.py +884 -24
- pulumi_gcp/compute/backend_bucket.py +68 -0
- pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
- pulumi_gcp/compute/backend_service.py +54 -0
- pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
- pulumi_gcp/compute/backend_service_iam_member.py +464 -0
- pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
- pulumi_gcp/compute/cross_site_network.py +16 -0
- pulumi_gcp/compute/future_reservation.py +32 -0
- pulumi_gcp/compute/get_backend_bucket.py +12 -1
- pulumi_gcp/compute/get_backend_service.py +12 -1
- pulumi_gcp/compute/get_region_backend_service.py +12 -1
- pulumi_gcp/compute/get_resource_policy.py +2 -20
- pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
- pulumi_gcp/compute/machine_image_iam_member.py +8 -4
- pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
- pulumi_gcp/compute/network_edge_security_service.py +16 -0
- pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
- pulumi_gcp/compute/network_peering_routes_config.py +0 -100
- pulumi_gcp/compute/organization_security_policy.py +83 -51
- pulumi_gcp/compute/outputs.py +799 -16
- pulumi_gcp/compute/packet_mirroring.py +6 -0
- pulumi_gcp/compute/preview_feature.py +16 -0
- pulumi_gcp/compute/public_delegated_prefix.py +42 -0
- pulumi_gcp/compute/region_backend_service.py +54 -0
- pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
- pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
- pulumi_gcp/compute/region_resize_request.py +24 -0
- pulumi_gcp/compute/region_url_map.py +75 -0
- pulumi_gcp/compute/subnetwork.py +0 -98
- pulumi_gcp/compute/wire_group.py +16 -0
- pulumi_gcp/config/__init__.pyi +2 -2
- pulumi_gcp/config/vars.py +4 -4
- pulumi_gcp/container/_inputs.py +466 -18
- pulumi_gcp/container/cluster.py +16 -7
- pulumi_gcp/container/outputs.py +448 -15
- pulumi_gcp/databasemigrationservice/connection_profile.py +4 -2
- pulumi_gcp/databasemigrationservice/migration_job.py +4 -2
- pulumi_gcp/dataflow/flex_template_job.py +10 -0
- pulumi_gcp/dataform/repository.py +16 -0
- pulumi_gcp/dataform/repository_release_config.py +16 -0
- pulumi_gcp/dataform/repository_workflow_config.py +16 -0
- pulumi_gcp/diagflow/_inputs.py +152 -0
- pulumi_gcp/diagflow/cx_agent.py +425 -0
- pulumi_gcp/diagflow/outputs.py +143 -0
- pulumi_gcp/discoveryengine/__init__.py +1 -0
- pulumi_gcp/discoveryengine/_inputs.py +94 -0
- pulumi_gcp/discoveryengine/acl_config.py +393 -0
- pulumi_gcp/discoveryengine/outputs.py +92 -0
- pulumi_gcp/firebase/android_app.py +16 -0
- pulumi_gcp/firebase/app_check_play_integrity_config.py +4 -8
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +2 -4
- pulumi_gcp/firebase/app_check_service_config.py +6 -12
- pulumi_gcp/firebase/app_hosting_backend.py +4 -8
- pulumi_gcp/firebase/app_hosting_build.py +4 -8
- pulumi_gcp/firebase/app_hosting_traffic.py +6 -12
- pulumi_gcp/firebase/apple_app.py +16 -0
- pulumi_gcp/firebase/data_connect_service.py +4 -8
- pulumi_gcp/firebase/database_instance.py +20 -8
- pulumi_gcp/firebase/extensions_instance.py +12 -0
- pulumi_gcp/firebase/get_android_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app_config.py +16 -2
- pulumi_gcp/firebase/get_hosting_channel.py +4 -2
- pulumi_gcp/firebase/hosting_channel.py +20 -0
- pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
- pulumi_gcp/firebase/hosting_release.py +16 -0
- pulumi_gcp/firebase/hosting_site.py +16 -0
- pulumi_gcp/firebase/hosting_version.py +16 -0
- pulumi_gcp/firebase/storage_bucket.py +18 -0
- pulumi_gcp/firestore/index.py +118 -3
- pulumi_gcp/folder/service_identity.py +26 -0
- pulumi_gcp/gkehub/_inputs.py +0 -60
- pulumi_gcp/gkehub/get_membership.py +1 -12
- pulumi_gcp/gkehub/membership.py +0 -70
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
- pulumi_gcp/gkehub/outputs.py +0 -36
- pulumi_gcp/healthcare/_inputs.py +205 -0
- pulumi_gcp/healthcare/fhir_store.py +128 -0
- pulumi_gcp/healthcare/outputs.py +163 -0
- pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
- pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
- pulumi_gcp/iap/__init__.py +8 -0
- pulumi_gcp/iap/_inputs.py +260 -0
- pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
- pulumi_gcp/iap/get_web_region_forwarding_rule_service_iam_policy.py +182 -0
- pulumi_gcp/iap/outputs.py +152 -0
- pulumi_gcp/{beyondcorp/application_iam_binding.py → iap/web_forwarding_rule_service_iam_binding.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_member.py → iap/web_forwarding_rule_service_iam_member.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_policy.py → iap/web_forwarding_rule_service_iam_policy.py} +212 -294
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_binding.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_member.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_policy.py +910 -0
- pulumi_gcp/kms/autokey_config.py +0 -2
- pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
- pulumi_gcp/kms/key_handle.py +0 -2
- pulumi_gcp/logging/organization_sink.py +7 -7
- pulumi_gcp/managedkafka/connect_cluster.py +4 -0
- pulumi_gcp/managedkafka/connector.py +4 -0
- pulumi_gcp/memorystore/get_instance.py +1 -12
- pulumi_gcp/memorystore/instance.py +14 -84
- pulumi_gcp/netapp/storage_pool.py +91 -2
- pulumi_gcp/netapp/volume.py +47 -0
- pulumi_gcp/networkmanagement/__init__.py +1 -0
- pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
- pulumi_gcp/networksecurity/authorization_policy.py +12 -0
- pulumi_gcp/networkservices/gateway.py +7 -7
- pulumi_gcp/networkservices/lb_traffic_extension.py +24 -23
- pulumi_gcp/networkservices/service_lb_policies.py +12 -0
- pulumi_gcp/notebooks/__init__.py +0 -1
- pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
- pulumi_gcp/oracledatabase/cloud_vm_cluster.py +3 -3
- pulumi_gcp/projects/service.py +2 -11
- pulumi_gcp/provider.py +20 -20
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/cluster.py +0 -70
- pulumi_gcp/redis/get_cluster.py +1 -12
- pulumi_gcp/resourcemanager/capability.py +16 -0
- pulumi_gcp/runtimeconfig/config.py +16 -0
- pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
- pulumi_gcp/runtimeconfig/variable.py +10 -0
- pulumi_gcp/saasruntime/__init__.py +12 -0
- pulumi_gcp/saasruntime/_inputs.py +513 -0
- pulumi_gcp/saasruntime/outputs.py +431 -0
- pulumi_gcp/saasruntime/saa_s.py +819 -0
- pulumi_gcp/saasruntime/unit_kind.py +1024 -0
- pulumi_gcp/securesourcemanager/_inputs.py +20 -19
- pulumi_gcp/securesourcemanager/instance.py +7 -7
- pulumi_gcp/securesourcemanager/outputs.py +15 -14
- pulumi_gcp/securesourcemanager/repository.py +7 -7
- pulumi_gcp/serviceaccount/get_account_key.py +1 -21
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
- pulumi_gcp/sql/_inputs.py +135 -1
- pulumi_gcp/sql/database_instance.py +94 -0
- pulumi_gcp/sql/get_database_instance.py +23 -1
- pulumi_gcp/sql/outputs.py +276 -3
- pulumi_gcp/sql/user.py +61 -0
- pulumi_gcp/storage/_inputs.py +253 -7
- pulumi_gcp/storage/bucket_object.py +0 -9
- pulumi_gcp/storage/outputs.py +198 -8
- pulumi_gcp/storage/transfer_job.py +47 -0
- pulumi_gcp/tpu/__init__.py +0 -2
- pulumi_gcp/tpu/_inputs.py +0 -93
- pulumi_gcp/tpu/outputs.py +0 -72
- pulumi_gcp/tpu/v2_queued_resource.py +16 -0
- pulumi_gcp/tpu/v2_vm.py +16 -0
- pulumi_gcp/vertex/_inputs.py +8 -9
- pulumi_gcp/vertex/ai_endpoint.py +2 -4
- pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +0 -2
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_index.py +24 -23
- pulumi_gcp/vertex/ai_metadata_store.py +16 -0
- pulumi_gcp/vertex/outputs.py +7 -8
- pulumi_gcp/workstations/workstation.py +16 -0
- pulumi_gcp/workstations/workstation_cluster.py +16 -0
- pulumi_gcp/workstations/workstation_config.py +16 -0
- pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
- pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
- pulumi_gcp/workstations/workstation_iam_member.py +272 -0
- pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/RECORD +266 -255
- pulumi_gcp/beyondcorp/application.py +0 -746
- pulumi_gcp/beyondcorp/get_application_iam_policy.py +0 -182
- pulumi_gcp/notebooks/location.py +0 -285
- pulumi_gcp/tpu/get_tensorflow_versions.py +0 -184
- pulumi_gcp/tpu/node.py +0 -1062
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/WHEEL +0 -0
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/top_level.txt +0 -0
@@ -156,6 +156,125 @@ class AiFeatureStoreEntityTypeIamPolicy(pulumi.CustomResource):
|
|
156
156
|
policy_data: Optional[pulumi.Input[_builtins.str]] = None,
|
157
157
|
__props__=None):
|
158
158
|
"""
|
159
|
+
Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
|
160
|
+
|
161
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
|
162
|
+
* `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
|
163
|
+
* `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
|
164
|
+
|
165
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
166
|
+
|
167
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
|
168
|
+
|
169
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
|
170
|
+
|
171
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
172
|
+
|
173
|
+
## vertex.AiFeatureStoreEntityTypeIamPolicy
|
174
|
+
|
175
|
+
```python
|
176
|
+
import pulumi
|
177
|
+
import pulumi_gcp as gcp
|
178
|
+
|
179
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
180
|
+
"role": "roles/viewer",
|
181
|
+
"members": ["user:jane@example.com"],
|
182
|
+
}])
|
183
|
+
policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
|
184
|
+
featurestore=entity["featurestore"],
|
185
|
+
entitytype=entity["name"],
|
186
|
+
policy_data=admin.policy_data)
|
187
|
+
```
|
188
|
+
|
189
|
+
## vertex.AiFeatureStoreEntityTypeIamBinding
|
190
|
+
|
191
|
+
```python
|
192
|
+
import pulumi
|
193
|
+
import pulumi_gcp as gcp
|
194
|
+
|
195
|
+
binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
|
196
|
+
featurestore=entity["featurestore"],
|
197
|
+
entitytype=entity["name"],
|
198
|
+
role="roles/viewer",
|
199
|
+
members=["user:jane@example.com"])
|
200
|
+
```
|
201
|
+
|
202
|
+
## vertex.AiFeatureStoreEntityTypeIamMember
|
203
|
+
|
204
|
+
```python
|
205
|
+
import pulumi
|
206
|
+
import pulumi_gcp as gcp
|
207
|
+
|
208
|
+
member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
|
209
|
+
featurestore=entity["featurestore"],
|
210
|
+
entitytype=entity["name"],
|
211
|
+
role="roles/viewer",
|
212
|
+
member="user:jane@example.com")
|
213
|
+
```
|
214
|
+
|
215
|
+
## > **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
|
216
|
+
|
217
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
218
|
+
---
|
219
|
+
|
220
|
+
# IAM policy for Vertex AI FeaturestoreEntitytype
|
221
|
+
|
222
|
+
Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
|
223
|
+
|
224
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
|
225
|
+
* `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
|
226
|
+
* `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
|
227
|
+
|
228
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
229
|
+
|
230
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
|
231
|
+
|
232
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
|
233
|
+
|
234
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
235
|
+
|
236
|
+
## vertex.AiFeatureStoreEntityTypeIamPolicy
|
237
|
+
|
238
|
+
```python
|
239
|
+
import pulumi
|
240
|
+
import pulumi_gcp as gcp
|
241
|
+
|
242
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
243
|
+
"role": "roles/viewer",
|
244
|
+
"members": ["user:jane@example.com"],
|
245
|
+
}])
|
246
|
+
policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
|
247
|
+
featurestore=entity["featurestore"],
|
248
|
+
entitytype=entity["name"],
|
249
|
+
policy_data=admin.policy_data)
|
250
|
+
```
|
251
|
+
|
252
|
+
## vertex.AiFeatureStoreEntityTypeIamBinding
|
253
|
+
|
254
|
+
```python
|
255
|
+
import pulumi
|
256
|
+
import pulumi_gcp as gcp
|
257
|
+
|
258
|
+
binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
|
259
|
+
featurestore=entity["featurestore"],
|
260
|
+
entitytype=entity["name"],
|
261
|
+
role="roles/viewer",
|
262
|
+
members=["user:jane@example.com"])
|
263
|
+
```
|
264
|
+
|
265
|
+
## vertex.AiFeatureStoreEntityTypeIamMember
|
266
|
+
|
267
|
+
```python
|
268
|
+
import pulumi
|
269
|
+
import pulumi_gcp as gcp
|
270
|
+
|
271
|
+
member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
|
272
|
+
featurestore=entity["featurestore"],
|
273
|
+
entitytype=entity["name"],
|
274
|
+
role="roles/viewer",
|
275
|
+
member="user:jane@example.com")
|
276
|
+
```
|
277
|
+
|
159
278
|
## Import
|
160
279
|
|
161
280
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -204,6 +323,125 @@ class AiFeatureStoreEntityTypeIamPolicy(pulumi.CustomResource):
|
|
204
323
|
args: AiFeatureStoreEntityTypeIamPolicyArgs,
|
205
324
|
opts: Optional[pulumi.ResourceOptions] = None):
|
206
325
|
"""
|
326
|
+
Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
|
327
|
+
|
328
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
|
329
|
+
* `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
|
330
|
+
* `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
|
331
|
+
|
332
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
333
|
+
|
334
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
|
335
|
+
|
336
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
|
337
|
+
|
338
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
339
|
+
|
340
|
+
## vertex.AiFeatureStoreEntityTypeIamPolicy
|
341
|
+
|
342
|
+
```python
|
343
|
+
import pulumi
|
344
|
+
import pulumi_gcp as gcp
|
345
|
+
|
346
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
347
|
+
"role": "roles/viewer",
|
348
|
+
"members": ["user:jane@example.com"],
|
349
|
+
}])
|
350
|
+
policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
|
351
|
+
featurestore=entity["featurestore"],
|
352
|
+
entitytype=entity["name"],
|
353
|
+
policy_data=admin.policy_data)
|
354
|
+
```
|
355
|
+
|
356
|
+
## vertex.AiFeatureStoreEntityTypeIamBinding
|
357
|
+
|
358
|
+
```python
|
359
|
+
import pulumi
|
360
|
+
import pulumi_gcp as gcp
|
361
|
+
|
362
|
+
binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
|
363
|
+
featurestore=entity["featurestore"],
|
364
|
+
entitytype=entity["name"],
|
365
|
+
role="roles/viewer",
|
366
|
+
members=["user:jane@example.com"])
|
367
|
+
```
|
368
|
+
|
369
|
+
## vertex.AiFeatureStoreEntityTypeIamMember
|
370
|
+
|
371
|
+
```python
|
372
|
+
import pulumi
|
373
|
+
import pulumi_gcp as gcp
|
374
|
+
|
375
|
+
member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
|
376
|
+
featurestore=entity["featurestore"],
|
377
|
+
entitytype=entity["name"],
|
378
|
+
role="roles/viewer",
|
379
|
+
member="user:jane@example.com")
|
380
|
+
```
|
381
|
+
|
382
|
+
## > **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
|
383
|
+
|
384
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
385
|
+
---
|
386
|
+
|
387
|
+
# IAM policy for Vertex AI FeaturestoreEntitytype
|
388
|
+
|
389
|
+
Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
|
390
|
+
|
391
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
|
392
|
+
* `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
|
393
|
+
* `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
|
394
|
+
|
395
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
396
|
+
|
397
|
+
* `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
|
398
|
+
|
399
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
|
400
|
+
|
401
|
+
> **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
|
402
|
+
|
403
|
+
## vertex.AiFeatureStoreEntityTypeIamPolicy
|
404
|
+
|
405
|
+
```python
|
406
|
+
import pulumi
|
407
|
+
import pulumi_gcp as gcp
|
408
|
+
|
409
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
410
|
+
"role": "roles/viewer",
|
411
|
+
"members": ["user:jane@example.com"],
|
412
|
+
}])
|
413
|
+
policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
|
414
|
+
featurestore=entity["featurestore"],
|
415
|
+
entitytype=entity["name"],
|
416
|
+
policy_data=admin.policy_data)
|
417
|
+
```
|
418
|
+
|
419
|
+
## vertex.AiFeatureStoreEntityTypeIamBinding
|
420
|
+
|
421
|
+
```python
|
422
|
+
import pulumi
|
423
|
+
import pulumi_gcp as gcp
|
424
|
+
|
425
|
+
binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
|
426
|
+
featurestore=entity["featurestore"],
|
427
|
+
entitytype=entity["name"],
|
428
|
+
role="roles/viewer",
|
429
|
+
members=["user:jane@example.com"])
|
430
|
+
```
|
431
|
+
|
432
|
+
## vertex.AiFeatureStoreEntityTypeIamMember
|
433
|
+
|
434
|
+
```python
|
435
|
+
import pulumi
|
436
|
+
import pulumi_gcp as gcp
|
437
|
+
|
438
|
+
member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
|
439
|
+
featurestore=entity["featurestore"],
|
440
|
+
entitytype=entity["name"],
|
441
|
+
role="roles/viewer",
|
442
|
+
member="user:jane@example.com")
|
443
|
+
```
|
444
|
+
|
207
445
|
## Import
|
208
446
|
|
209
447
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -305,6 +305,130 @@ class AiFeatureStoreIamBinding(pulumi.CustomResource):
|
|
305
305
|
role: Optional[pulumi.Input[_builtins.str]] = None,
|
306
306
|
__props__=None):
|
307
307
|
"""
|
308
|
+
Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
|
309
|
+
|
310
|
+
* `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
|
311
|
+
* `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
|
312
|
+
* `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
|
313
|
+
|
314
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
315
|
+
|
316
|
+
* `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
|
317
|
+
|
318
|
+
> **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
|
319
|
+
|
320
|
+
> **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
321
|
+
|
322
|
+
## vertex.AiFeatureStoreIamPolicy
|
323
|
+
|
324
|
+
```python
|
325
|
+
import pulumi
|
326
|
+
import pulumi_gcp as gcp
|
327
|
+
|
328
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
329
|
+
"role": "roles/viewer",
|
330
|
+
"members": ["user:jane@example.com"],
|
331
|
+
}])
|
332
|
+
policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
|
333
|
+
project=featurestore["project"],
|
334
|
+
region=featurestore["region"],
|
335
|
+
featurestore=featurestore["name"],
|
336
|
+
policy_data=admin.policy_data)
|
337
|
+
```
|
338
|
+
|
339
|
+
## vertex.AiFeatureStoreIamBinding
|
340
|
+
|
341
|
+
```python
|
342
|
+
import pulumi
|
343
|
+
import pulumi_gcp as gcp
|
344
|
+
|
345
|
+
binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
|
346
|
+
project=featurestore["project"],
|
347
|
+
region=featurestore["region"],
|
348
|
+
featurestore=featurestore["name"],
|
349
|
+
role="roles/viewer",
|
350
|
+
members=["user:jane@example.com"])
|
351
|
+
```
|
352
|
+
|
353
|
+
## vertex.AiFeatureStoreIamMember
|
354
|
+
|
355
|
+
```python
|
356
|
+
import pulumi
|
357
|
+
import pulumi_gcp as gcp
|
358
|
+
|
359
|
+
member = gcp.vertex.AiFeatureStoreIamMember("member",
|
360
|
+
project=featurestore["project"],
|
361
|
+
region=featurestore["region"],
|
362
|
+
featurestore=featurestore["name"],
|
363
|
+
role="roles/viewer",
|
364
|
+
member="user:jane@example.com")
|
365
|
+
```
|
366
|
+
|
367
|
+
## This resource supports User Project Overrides.
|
368
|
+
|
369
|
+
-
|
370
|
+
|
371
|
+
# IAM policy for Vertex AI Featurestore
|
372
|
+
|
373
|
+
Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
|
374
|
+
|
375
|
+
* `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
|
376
|
+
* `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
|
377
|
+
* `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
|
378
|
+
|
379
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
380
|
+
|
381
|
+
* `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
|
382
|
+
|
383
|
+
> **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
|
384
|
+
|
385
|
+
> **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
386
|
+
|
387
|
+
## vertex.AiFeatureStoreIamPolicy
|
388
|
+
|
389
|
+
```python
|
390
|
+
import pulumi
|
391
|
+
import pulumi_gcp as gcp
|
392
|
+
|
393
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
394
|
+
"role": "roles/viewer",
|
395
|
+
"members": ["user:jane@example.com"],
|
396
|
+
}])
|
397
|
+
policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
|
398
|
+
project=featurestore["project"],
|
399
|
+
region=featurestore["region"],
|
400
|
+
featurestore=featurestore["name"],
|
401
|
+
policy_data=admin.policy_data)
|
402
|
+
```
|
403
|
+
|
404
|
+
## vertex.AiFeatureStoreIamBinding
|
405
|
+
|
406
|
+
```python
|
407
|
+
import pulumi
|
408
|
+
import pulumi_gcp as gcp
|
409
|
+
|
410
|
+
binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
|
411
|
+
project=featurestore["project"],
|
412
|
+
region=featurestore["region"],
|
413
|
+
featurestore=featurestore["name"],
|
414
|
+
role="roles/viewer",
|
415
|
+
members=["user:jane@example.com"])
|
416
|
+
```
|
417
|
+
|
418
|
+
## vertex.AiFeatureStoreIamMember
|
419
|
+
|
420
|
+
```python
|
421
|
+
import pulumi
|
422
|
+
import pulumi_gcp as gcp
|
423
|
+
|
424
|
+
member = gcp.vertex.AiFeatureStoreIamMember("member",
|
425
|
+
project=featurestore["project"],
|
426
|
+
region=featurestore["region"],
|
427
|
+
featurestore=featurestore["name"],
|
428
|
+
role="roles/viewer",
|
429
|
+
member="user:jane@example.com")
|
430
|
+
```
|
431
|
+
|
308
432
|
## Import
|
309
433
|
|
310
434
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -373,6 +497,130 @@ class AiFeatureStoreIamBinding(pulumi.CustomResource):
|
|
373
497
|
args: AiFeatureStoreIamBindingArgs,
|
374
498
|
opts: Optional[pulumi.ResourceOptions] = None):
|
375
499
|
"""
|
500
|
+
Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
|
501
|
+
|
502
|
+
* `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
|
503
|
+
* `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
|
504
|
+
* `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
|
505
|
+
|
506
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
507
|
+
|
508
|
+
* `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
|
509
|
+
|
510
|
+
> **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
|
511
|
+
|
512
|
+
> **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
513
|
+
|
514
|
+
## vertex.AiFeatureStoreIamPolicy
|
515
|
+
|
516
|
+
```python
|
517
|
+
import pulumi
|
518
|
+
import pulumi_gcp as gcp
|
519
|
+
|
520
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
521
|
+
"role": "roles/viewer",
|
522
|
+
"members": ["user:jane@example.com"],
|
523
|
+
}])
|
524
|
+
policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
|
525
|
+
project=featurestore["project"],
|
526
|
+
region=featurestore["region"],
|
527
|
+
featurestore=featurestore["name"],
|
528
|
+
policy_data=admin.policy_data)
|
529
|
+
```
|
530
|
+
|
531
|
+
## vertex.AiFeatureStoreIamBinding
|
532
|
+
|
533
|
+
```python
|
534
|
+
import pulumi
|
535
|
+
import pulumi_gcp as gcp
|
536
|
+
|
537
|
+
binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
|
538
|
+
project=featurestore["project"],
|
539
|
+
region=featurestore["region"],
|
540
|
+
featurestore=featurestore["name"],
|
541
|
+
role="roles/viewer",
|
542
|
+
members=["user:jane@example.com"])
|
543
|
+
```
|
544
|
+
|
545
|
+
## vertex.AiFeatureStoreIamMember
|
546
|
+
|
547
|
+
```python
|
548
|
+
import pulumi
|
549
|
+
import pulumi_gcp as gcp
|
550
|
+
|
551
|
+
member = gcp.vertex.AiFeatureStoreIamMember("member",
|
552
|
+
project=featurestore["project"],
|
553
|
+
region=featurestore["region"],
|
554
|
+
featurestore=featurestore["name"],
|
555
|
+
role="roles/viewer",
|
556
|
+
member="user:jane@example.com")
|
557
|
+
```
|
558
|
+
|
559
|
+
## This resource supports User Project Overrides.
|
560
|
+
|
561
|
+
-
|
562
|
+
|
563
|
+
# IAM policy for Vertex AI Featurestore
|
564
|
+
|
565
|
+
Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
|
566
|
+
|
567
|
+
* `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
|
568
|
+
* `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
|
569
|
+
* `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
|
570
|
+
|
571
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
572
|
+
|
573
|
+
* `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
|
574
|
+
|
575
|
+
> **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
|
576
|
+
|
577
|
+
> **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
|
578
|
+
|
579
|
+
## vertex.AiFeatureStoreIamPolicy
|
580
|
+
|
581
|
+
```python
|
582
|
+
import pulumi
|
583
|
+
import pulumi_gcp as gcp
|
584
|
+
|
585
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
586
|
+
"role": "roles/viewer",
|
587
|
+
"members": ["user:jane@example.com"],
|
588
|
+
}])
|
589
|
+
policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
|
590
|
+
project=featurestore["project"],
|
591
|
+
region=featurestore["region"],
|
592
|
+
featurestore=featurestore["name"],
|
593
|
+
policy_data=admin.policy_data)
|
594
|
+
```
|
595
|
+
|
596
|
+
## vertex.AiFeatureStoreIamBinding
|
597
|
+
|
598
|
+
```python
|
599
|
+
import pulumi
|
600
|
+
import pulumi_gcp as gcp
|
601
|
+
|
602
|
+
binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
|
603
|
+
project=featurestore["project"],
|
604
|
+
region=featurestore["region"],
|
605
|
+
featurestore=featurestore["name"],
|
606
|
+
role="roles/viewer",
|
607
|
+
members=["user:jane@example.com"])
|
608
|
+
```
|
609
|
+
|
610
|
+
## vertex.AiFeatureStoreIamMember
|
611
|
+
|
612
|
+
```python
|
613
|
+
import pulumi
|
614
|
+
import pulumi_gcp as gcp
|
615
|
+
|
616
|
+
member = gcp.vertex.AiFeatureStoreIamMember("member",
|
617
|
+
project=featurestore["project"],
|
618
|
+
region=featurestore["region"],
|
619
|
+
featurestore=featurestore["name"],
|
620
|
+
role="roles/viewer",
|
621
|
+
member="user:jane@example.com")
|
622
|
+
```
|
623
|
+
|
376
624
|
## Import
|
377
625
|
|
378
626
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|