pulumi-gcp 9.0.0a1__py3-none-any.whl → 9.0.0a1758219982__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +48 -0
- pulumi_gcp/activedirectory/peering.py +16 -0
- pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
- pulumi_gcp/apigateway/api_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_iam_policy.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
- pulumi_gcp/artifactregistry/__init__.py +1 -0
- pulumi_gcp/artifactregistry/get_python_package.py +237 -0
- pulumi_gcp/artifactregistry/get_repository.py +12 -1
- pulumi_gcp/artifactregistry/repository.py +28 -0
- pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
- pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
- pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
- pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
- pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
- pulumi_gcp/bigquery/app_profile.py +14 -49
- pulumi_gcp/bigquery/dataset_access.py +4 -8
- pulumi_gcp/bigquery/table.py +7 -21
- pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
- pulumi_gcp/bigtable/app_profile.py +14 -49
- pulumi_gcp/bigtable/table.py +42 -42
- pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
- pulumi_gcp/chronicle/_inputs.py +6 -5
- pulumi_gcp/chronicle/outputs.py +4 -3
- pulumi_gcp/chronicle/reference_list.py +53 -5
- pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
- pulumi_gcp/cloudbuild/_inputs.py +20 -0
- pulumi_gcp/cloudbuild/outputs.py +14 -0
- pulumi_gcp/cloudbuild/trigger.py +4 -2
- pulumi_gcp/cloudbuild/worker_pool.py +28 -21
- pulumi_gcp/cloudfunctions/function.py +4 -8
- pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
- pulumi_gcp/cloudrunv2/_inputs.py +57 -0
- pulumi_gcp/cloudrunv2/get_service.py +12 -1
- pulumi_gcp/cloudrunv2/outputs.py +81 -0
- pulumi_gcp/cloudrunv2/service.py +54 -0
- pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
- pulumi_gcp/composer/environment.py +28 -49
- pulumi_gcp/compute/_inputs.py +804 -24
- pulumi_gcp/compute/backend_bucket.py +14 -0
- pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
- pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
- pulumi_gcp/compute/backend_service_iam_member.py +464 -0
- pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
- pulumi_gcp/compute/cross_site_network.py +16 -0
- pulumi_gcp/compute/future_reservation.py +32 -0
- pulumi_gcp/compute/get_region_backend_service.py +12 -1
- pulumi_gcp/compute/get_resource_policy.py +2 -20
- pulumi_gcp/compute/instance_from_machine_image.py +75 -110
- pulumi_gcp/compute/instance_from_template.py +75 -110
- pulumi_gcp/compute/instance_group_manager.py +7 -14
- pulumi_gcp/compute/instance_template.py +7 -14
- pulumi_gcp/compute/interconnect.py +4 -8
- pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
- pulumi_gcp/compute/machine_image_iam_member.py +8 -4
- pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
- pulumi_gcp/compute/network_edge_security_service.py +16 -0
- pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
- pulumi_gcp/compute/outputs.py +671 -16
- pulumi_gcp/compute/preview_feature.py +16 -0
- pulumi_gcp/compute/public_delegated_prefix.py +42 -0
- pulumi_gcp/compute/region_backend_service.py +54 -0
- pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
- pulumi_gcp/compute/region_instance_group_manager.py +7 -14
- pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
- pulumi_gcp/compute/region_resize_request.py +24 -0
- pulumi_gcp/compute/region_url_map.py +75 -0
- pulumi_gcp/compute/wire_group.py +16 -0
- pulumi_gcp/container/_inputs.py +446 -18
- pulumi_gcp/container/aws_cluster.py +28 -42
- pulumi_gcp/container/aws_node_pool.py +28 -42
- pulumi_gcp/container/azure_cluster.py +35 -70
- pulumi_gcp/container/azure_node_pool.py +28 -42
- pulumi_gcp/container/cluster.py +16 -7
- pulumi_gcp/container/outputs.py +423 -15
- pulumi_gcp/dataflow/flex_template_job.py +10 -0
- pulumi_gcp/dataform/repository.py +16 -0
- pulumi_gcp/dataform/repository_release_config.py +16 -0
- pulumi_gcp/dataform/repository_workflow_config.py +16 -0
- pulumi_gcp/dataplex/asset.py +28 -21
- pulumi_gcp/dataplex/zone.py +28 -21
- pulumi_gcp/dataproc/cluster.py +21 -14
- pulumi_gcp/dataproc/workflow_template.py +42 -105
- pulumi_gcp/discoveryengine/__init__.py +1 -0
- pulumi_gcp/discoveryengine/_inputs.py +94 -0
- pulumi_gcp/discoveryengine/acl_config.py +393 -0
- pulumi_gcp/discoveryengine/outputs.py +92 -0
- pulumi_gcp/firebase/android_app.py +16 -0
- pulumi_gcp/firebase/apple_app.py +16 -0
- pulumi_gcp/firebase/database_instance.py +16 -0
- pulumi_gcp/firebase/extensions_instance.py +12 -0
- pulumi_gcp/firebase/get_android_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app_config.py +16 -2
- pulumi_gcp/firebase/get_hosting_channel.py +4 -2
- pulumi_gcp/firebase/hosting_channel.py +20 -0
- pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
- pulumi_gcp/firebase/hosting_release.py +16 -0
- pulumi_gcp/firebase/hosting_site.py +16 -0
- pulumi_gcp/firebase/hosting_version.py +16 -0
- pulumi_gcp/firebase/storage_bucket.py +18 -0
- pulumi_gcp/firestore/index.py +118 -3
- pulumi_gcp/folder/service_identity.py +26 -0
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
- pulumi_gcp/healthcare/_inputs.py +205 -0
- pulumi_gcp/healthcare/fhir_store.py +128 -0
- pulumi_gcp/healthcare/outputs.py +163 -0
- pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
- pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
- pulumi_gcp/iap/__init__.py +4 -0
- pulumi_gcp/iap/_inputs.py +130 -0
- pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
- pulumi_gcp/iap/outputs.py +76 -0
- pulumi_gcp/iap/web_forwarding_rule_service_iam_binding.py +1002 -0
- pulumi_gcp/iap/web_forwarding_rule_service_iam_member.py +1002 -0
- pulumi_gcp/iap/web_forwarding_rule_service_iam_policy.py +821 -0
- pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
- pulumi_gcp/logging/billing_account_bucket_config.py +7 -21
- pulumi_gcp/logging/folder_bucket_config.py +7 -21
- pulumi_gcp/logging/organization_bucket_config.py +7 -21
- pulumi_gcp/logging/organization_sink.py +7 -7
- pulumi_gcp/managedkafka/connect_cluster.py +4 -0
- pulumi_gcp/managedkafka/connector.py +4 -0
- pulumi_gcp/memorystore/instance.py +14 -14
- pulumi_gcp/monitoring/dashboard.py +7 -14
- pulumi_gcp/netapp/storage_pool.py +91 -2
- pulumi_gcp/netapp/volume.py +47 -0
- pulumi_gcp/networkmanagement/__init__.py +1 -0
- pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
- pulumi_gcp/networksecurity/authorization_policy.py +12 -0
- pulumi_gcp/networkservices/gateway.py +7 -7
- pulumi_gcp/networkservices/service_lb_policies.py +12 -0
- pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
- pulumi_gcp/organizations/project.py +7 -21
- pulumi_gcp/projects/service.py +0 -7
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/resourcemanager/capability.py +16 -0
- pulumi_gcp/runtimeconfig/config.py +16 -0
- pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
- pulumi_gcp/runtimeconfig/variable.py +10 -0
- pulumi_gcp/saasruntime/__init__.py +1 -0
- pulumi_gcp/saasruntime/_inputs.py +458 -0
- pulumi_gcp/saasruntime/outputs.py +392 -0
- pulumi_gcp/saasruntime/saa_s.py +4 -0
- pulumi_gcp/saasruntime/unit_kind.py +1024 -0
- pulumi_gcp/securesourcemanager/instance.py +7 -7
- pulumi_gcp/securesourcemanager/repository.py +7 -7
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
- pulumi_gcp/sql/_inputs.py +135 -1
- pulumi_gcp/sql/database_instance.py +54 -14
- pulumi_gcp/sql/get_database_instance.py +12 -1
- pulumi_gcp/sql/outputs.py +265 -3
- pulumi_gcp/storage/_inputs.py +246 -0
- pulumi_gcp/storage/bucket.py +7 -14
- pulumi_gcp/storage/bucket_object.py +0 -9
- pulumi_gcp/storage/outputs.py +191 -1
- pulumi_gcp/storage/transfer_job.py +47 -0
- pulumi_gcp/tpu/v2_queued_resource.py +16 -0
- pulumi_gcp/tpu/v2_vm.py +16 -0
- pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_metadata_store.py +16 -0
- pulumi_gcp/workstations/workstation.py +16 -0
- pulumi_gcp/workstations/workstation_cluster.py +16 -0
- pulumi_gcp/workstations/workstation_config.py +16 -0
- pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
- pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
- pulumi_gcp/workstations/workstation_iam_member.py +272 -0
- pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
- {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/METADATA +1 -1
- {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/RECORD +209 -200
- {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/WHEEL +0 -0
- {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/top_level.txt +0 -0
@@ -44,8 +44,10 @@ class BackendBucketArgs:
|
|
44
44
|
client when the resource is created.
|
45
45
|
:param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
|
46
46
|
:param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
|
47
|
+
Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
|
47
48
|
:param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
|
48
49
|
If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
|
50
|
+
Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
|
49
51
|
Possible values are: `INTERNAL_MANAGED`.
|
50
52
|
:param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
|
51
53
|
created. The name must be 1-63 characters long, and comply with
|
@@ -161,6 +163,7 @@ class BackendBucketArgs:
|
|
161
163
|
def enable_cdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
162
164
|
"""
|
163
165
|
If true, enable Cloud CDN for this BackendBucket.
|
166
|
+
Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
|
164
167
|
"""
|
165
168
|
return pulumi.get(self, "enable_cdn")
|
166
169
|
|
@@ -174,6 +177,7 @@ class BackendBucketArgs:
|
|
174
177
|
"""
|
175
178
|
The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
|
176
179
|
If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
|
180
|
+
Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
|
177
181
|
Possible values are: `INTERNAL_MANAGED`.
|
178
182
|
"""
|
179
183
|
return pulumi.get(self, "load_balancing_scheme")
|
@@ -256,8 +260,10 @@ class _BackendBucketState:
|
|
256
260
|
client when the resource is created.
|
257
261
|
:param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
|
258
262
|
:param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
|
263
|
+
Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
|
259
264
|
:param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
|
260
265
|
If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
|
266
|
+
Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
|
261
267
|
Possible values are: `INTERNAL_MANAGED`.
|
262
268
|
:param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
|
263
269
|
created. The name must be 1-63 characters long, and comply with
|
@@ -391,6 +397,7 @@ class _BackendBucketState:
|
|
391
397
|
def enable_cdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
392
398
|
"""
|
393
399
|
If true, enable Cloud CDN for this BackendBucket.
|
400
|
+
Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
|
394
401
|
"""
|
395
402
|
return pulumi.get(self, "enable_cdn")
|
396
403
|
|
@@ -404,6 +411,7 @@ class _BackendBucketState:
|
|
404
411
|
"""
|
405
412
|
The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
|
406
413
|
If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
|
414
|
+
Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
|
407
415
|
Possible values are: `INTERNAL_MANAGED`.
|
408
416
|
"""
|
409
417
|
return pulumi.get(self, "load_balancing_scheme")
|
@@ -616,8 +624,10 @@ class BackendBucket(pulumi.CustomResource):
|
|
616
624
|
client when the resource is created.
|
617
625
|
:param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
|
618
626
|
:param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
|
627
|
+
Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
|
619
628
|
:param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
|
620
629
|
If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
|
630
|
+
Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
|
621
631
|
Possible values are: `INTERNAL_MANAGED`.
|
622
632
|
:param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
|
623
633
|
created. The name must be 1-63 characters long, and comply with
|
@@ -845,8 +855,10 @@ class BackendBucket(pulumi.CustomResource):
|
|
845
855
|
client when the resource is created.
|
846
856
|
:param pulumi.Input[_builtins.str] edge_security_policy: The security policy associated with this backend bucket.
|
847
857
|
:param pulumi.Input[_builtins.bool] enable_cdn: If true, enable Cloud CDN for this BackendBucket.
|
858
|
+
Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
|
848
859
|
:param pulumi.Input[_builtins.str] load_balancing_scheme: The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
|
849
860
|
If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
|
861
|
+
Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
|
850
862
|
Possible values are: `INTERNAL_MANAGED`.
|
851
863
|
:param pulumi.Input[_builtins.str] name: Name of the resource. Provided by the client when the resource is
|
852
864
|
created. The name must be 1-63 characters long, and comply with
|
@@ -944,6 +956,7 @@ class BackendBucket(pulumi.CustomResource):
|
|
944
956
|
def enable_cdn(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
945
957
|
"""
|
946
958
|
If true, enable Cloud CDN for this BackendBucket.
|
959
|
+
Note: This cannot be set to true when loadBalancingScheme is set to INTERNAL_MANAGED.
|
947
960
|
"""
|
948
961
|
return pulumi.get(self, "enable_cdn")
|
949
962
|
|
@@ -953,6 +966,7 @@ class BackendBucket(pulumi.CustomResource):
|
|
953
966
|
"""
|
954
967
|
The value can only be INTERNAL_MANAGED for cross-region internal layer 7 load balancer.
|
955
968
|
If loadBalancingScheme is not specified, the backend bucket can be used by classic global external load balancers, or global application external load balancers, or both.
|
969
|
+
Important: CDN cannot be enabled (enableCdn cannot be set to true) when loadBalancingScheme is set to INTERNAL_MANAGED.
|
956
970
|
Possible values are: `INTERNAL_MANAGED`.
|
957
971
|
"""
|
958
972
|
return pulumi.get(self, "load_balancing_scheme")
|
@@ -265,6 +265,124 @@ class BackendBucketIamBinding(pulumi.CustomResource):
|
|
265
265
|
role: Optional[pulumi.Input[_builtins.str]] = None,
|
266
266
|
__props__=None):
|
267
267
|
"""
|
268
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
271
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
272
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
277
|
+
|
278
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
282
|
+
## compute.BackendBucketIamPolicy
|
283
|
+
|
284
|
+
```python
|
285
|
+
import pulumi
|
286
|
+
import pulumi_gcp as gcp
|
287
|
+
|
288
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
289
|
+
"role": "roles/viewer",
|
290
|
+
"members": ["user:jane@example.com"],
|
291
|
+
}])
|
292
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
293
|
+
project=image_backend["project"],
|
294
|
+
name=image_backend["name"],
|
295
|
+
policy_data=admin.policy_data)
|
296
|
+
```
|
297
|
+
|
298
|
+
## compute.BackendBucketIamBinding
|
299
|
+
|
300
|
+
```python
|
301
|
+
import pulumi
|
302
|
+
import pulumi_gcp as gcp
|
303
|
+
|
304
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
305
|
+
project=image_backend["project"],
|
306
|
+
name=image_backend["name"],
|
307
|
+
role="roles/viewer",
|
308
|
+
members=["user:jane@example.com"])
|
309
|
+
```
|
310
|
+
|
311
|
+
## compute.BackendBucketIamMember
|
312
|
+
|
313
|
+
```python
|
314
|
+
import pulumi
|
315
|
+
import pulumi_gcp as gcp
|
316
|
+
|
317
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
318
|
+
project=image_backend["project"],
|
319
|
+
name=image_backend["name"],
|
320
|
+
role="roles/viewer",
|
321
|
+
member="user:jane@example.com")
|
322
|
+
```
|
323
|
+
|
324
|
+
## This resource supports User Project Overrides.
|
325
|
+
|
326
|
+
-
|
327
|
+
|
328
|
+
# IAM policy for Compute Engine BackendBucket
|
329
|
+
|
330
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
331
|
+
|
332
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
333
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
334
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
335
|
+
|
336
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
337
|
+
|
338
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
339
|
+
|
340
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
341
|
+
|
342
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
343
|
+
|
344
|
+
## compute.BackendBucketIamPolicy
|
345
|
+
|
346
|
+
```python
|
347
|
+
import pulumi
|
348
|
+
import pulumi_gcp as gcp
|
349
|
+
|
350
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
351
|
+
"role": "roles/viewer",
|
352
|
+
"members": ["user:jane@example.com"],
|
353
|
+
}])
|
354
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
355
|
+
project=image_backend["project"],
|
356
|
+
name=image_backend["name"],
|
357
|
+
policy_data=admin.policy_data)
|
358
|
+
```
|
359
|
+
|
360
|
+
## compute.BackendBucketIamBinding
|
361
|
+
|
362
|
+
```python
|
363
|
+
import pulumi
|
364
|
+
import pulumi_gcp as gcp
|
365
|
+
|
366
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
367
|
+
project=image_backend["project"],
|
368
|
+
name=image_backend["name"],
|
369
|
+
role="roles/viewer",
|
370
|
+
members=["user:jane@example.com"])
|
371
|
+
```
|
372
|
+
|
373
|
+
## compute.BackendBucketIamMember
|
374
|
+
|
375
|
+
```python
|
376
|
+
import pulumi
|
377
|
+
import pulumi_gcp as gcp
|
378
|
+
|
379
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
380
|
+
project=image_backend["project"],
|
381
|
+
name=image_backend["name"],
|
382
|
+
role="roles/viewer",
|
383
|
+
member="user:jane@example.com")
|
384
|
+
```
|
385
|
+
|
268
386
|
## Import
|
269
387
|
|
270
388
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -328,6 +446,124 @@ class BackendBucketIamBinding(pulumi.CustomResource):
|
|
328
446
|
args: BackendBucketIamBindingArgs,
|
329
447
|
opts: Optional[pulumi.ResourceOptions] = None):
|
330
448
|
"""
|
449
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
450
|
+
|
451
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
452
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
453
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
454
|
+
|
455
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
456
|
+
|
457
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
458
|
+
|
459
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
460
|
+
|
461
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
462
|
+
|
463
|
+
## compute.BackendBucketIamPolicy
|
464
|
+
|
465
|
+
```python
|
466
|
+
import pulumi
|
467
|
+
import pulumi_gcp as gcp
|
468
|
+
|
469
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
470
|
+
"role": "roles/viewer",
|
471
|
+
"members": ["user:jane@example.com"],
|
472
|
+
}])
|
473
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
474
|
+
project=image_backend["project"],
|
475
|
+
name=image_backend["name"],
|
476
|
+
policy_data=admin.policy_data)
|
477
|
+
```
|
478
|
+
|
479
|
+
## compute.BackendBucketIamBinding
|
480
|
+
|
481
|
+
```python
|
482
|
+
import pulumi
|
483
|
+
import pulumi_gcp as gcp
|
484
|
+
|
485
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
486
|
+
project=image_backend["project"],
|
487
|
+
name=image_backend["name"],
|
488
|
+
role="roles/viewer",
|
489
|
+
members=["user:jane@example.com"])
|
490
|
+
```
|
491
|
+
|
492
|
+
## compute.BackendBucketIamMember
|
493
|
+
|
494
|
+
```python
|
495
|
+
import pulumi
|
496
|
+
import pulumi_gcp as gcp
|
497
|
+
|
498
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
499
|
+
project=image_backend["project"],
|
500
|
+
name=image_backend["name"],
|
501
|
+
role="roles/viewer",
|
502
|
+
member="user:jane@example.com")
|
503
|
+
```
|
504
|
+
|
505
|
+
## This resource supports User Project Overrides.
|
506
|
+
|
507
|
+
-
|
508
|
+
|
509
|
+
# IAM policy for Compute Engine BackendBucket
|
510
|
+
|
511
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
512
|
+
|
513
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
514
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
515
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
516
|
+
|
517
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
518
|
+
|
519
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
520
|
+
|
521
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
522
|
+
|
523
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
524
|
+
|
525
|
+
## compute.BackendBucketIamPolicy
|
526
|
+
|
527
|
+
```python
|
528
|
+
import pulumi
|
529
|
+
import pulumi_gcp as gcp
|
530
|
+
|
531
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
532
|
+
"role": "roles/viewer",
|
533
|
+
"members": ["user:jane@example.com"],
|
534
|
+
}])
|
535
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
536
|
+
project=image_backend["project"],
|
537
|
+
name=image_backend["name"],
|
538
|
+
policy_data=admin.policy_data)
|
539
|
+
```
|
540
|
+
|
541
|
+
## compute.BackendBucketIamBinding
|
542
|
+
|
543
|
+
```python
|
544
|
+
import pulumi
|
545
|
+
import pulumi_gcp as gcp
|
546
|
+
|
547
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
548
|
+
project=image_backend["project"],
|
549
|
+
name=image_backend["name"],
|
550
|
+
role="roles/viewer",
|
551
|
+
members=["user:jane@example.com"])
|
552
|
+
```
|
553
|
+
|
554
|
+
## compute.BackendBucketIamMember
|
555
|
+
|
556
|
+
```python
|
557
|
+
import pulumi
|
558
|
+
import pulumi_gcp as gcp
|
559
|
+
|
560
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
561
|
+
project=image_backend["project"],
|
562
|
+
name=image_backend["name"],
|
563
|
+
role="roles/viewer",
|
564
|
+
member="user:jane@example.com")
|
565
|
+
```
|
566
|
+
|
331
567
|
## Import
|
332
568
|
|
333
569
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -265,6 +265,124 @@ class BackendBucketIamMember(pulumi.CustomResource):
|
|
265
265
|
role: Optional[pulumi.Input[_builtins.str]] = None,
|
266
266
|
__props__=None):
|
267
267
|
"""
|
268
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
271
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
272
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
277
|
+
|
278
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
282
|
+
## compute.BackendBucketIamPolicy
|
283
|
+
|
284
|
+
```python
|
285
|
+
import pulumi
|
286
|
+
import pulumi_gcp as gcp
|
287
|
+
|
288
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
289
|
+
"role": "roles/viewer",
|
290
|
+
"members": ["user:jane@example.com"],
|
291
|
+
}])
|
292
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
293
|
+
project=image_backend["project"],
|
294
|
+
name=image_backend["name"],
|
295
|
+
policy_data=admin.policy_data)
|
296
|
+
```
|
297
|
+
|
298
|
+
## compute.BackendBucketIamBinding
|
299
|
+
|
300
|
+
```python
|
301
|
+
import pulumi
|
302
|
+
import pulumi_gcp as gcp
|
303
|
+
|
304
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
305
|
+
project=image_backend["project"],
|
306
|
+
name=image_backend["name"],
|
307
|
+
role="roles/viewer",
|
308
|
+
members=["user:jane@example.com"])
|
309
|
+
```
|
310
|
+
|
311
|
+
## compute.BackendBucketIamMember
|
312
|
+
|
313
|
+
```python
|
314
|
+
import pulumi
|
315
|
+
import pulumi_gcp as gcp
|
316
|
+
|
317
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
318
|
+
project=image_backend["project"],
|
319
|
+
name=image_backend["name"],
|
320
|
+
role="roles/viewer",
|
321
|
+
member="user:jane@example.com")
|
322
|
+
```
|
323
|
+
|
324
|
+
## This resource supports User Project Overrides.
|
325
|
+
|
326
|
+
-
|
327
|
+
|
328
|
+
# IAM policy for Compute Engine BackendBucket
|
329
|
+
|
330
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
331
|
+
|
332
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
333
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
334
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
335
|
+
|
336
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
337
|
+
|
338
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
339
|
+
|
340
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
341
|
+
|
342
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
343
|
+
|
344
|
+
## compute.BackendBucketIamPolicy
|
345
|
+
|
346
|
+
```python
|
347
|
+
import pulumi
|
348
|
+
import pulumi_gcp as gcp
|
349
|
+
|
350
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
351
|
+
"role": "roles/viewer",
|
352
|
+
"members": ["user:jane@example.com"],
|
353
|
+
}])
|
354
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
355
|
+
project=image_backend["project"],
|
356
|
+
name=image_backend["name"],
|
357
|
+
policy_data=admin.policy_data)
|
358
|
+
```
|
359
|
+
|
360
|
+
## compute.BackendBucketIamBinding
|
361
|
+
|
362
|
+
```python
|
363
|
+
import pulumi
|
364
|
+
import pulumi_gcp as gcp
|
365
|
+
|
366
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
367
|
+
project=image_backend["project"],
|
368
|
+
name=image_backend["name"],
|
369
|
+
role="roles/viewer",
|
370
|
+
members=["user:jane@example.com"])
|
371
|
+
```
|
372
|
+
|
373
|
+
## compute.BackendBucketIamMember
|
374
|
+
|
375
|
+
```python
|
376
|
+
import pulumi
|
377
|
+
import pulumi_gcp as gcp
|
378
|
+
|
379
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
380
|
+
project=image_backend["project"],
|
381
|
+
name=image_backend["name"],
|
382
|
+
role="roles/viewer",
|
383
|
+
member="user:jane@example.com")
|
384
|
+
```
|
385
|
+
|
268
386
|
## Import
|
269
387
|
|
270
388
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -328,6 +446,124 @@ class BackendBucketIamMember(pulumi.CustomResource):
|
|
328
446
|
args: BackendBucketIamMemberArgs,
|
329
447
|
opts: Optional[pulumi.ResourceOptions] = None):
|
330
448
|
"""
|
449
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
450
|
+
|
451
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
452
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
453
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
454
|
+
|
455
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
456
|
+
|
457
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
458
|
+
|
459
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
460
|
+
|
461
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
462
|
+
|
463
|
+
## compute.BackendBucketIamPolicy
|
464
|
+
|
465
|
+
```python
|
466
|
+
import pulumi
|
467
|
+
import pulumi_gcp as gcp
|
468
|
+
|
469
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
470
|
+
"role": "roles/viewer",
|
471
|
+
"members": ["user:jane@example.com"],
|
472
|
+
}])
|
473
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
474
|
+
project=image_backend["project"],
|
475
|
+
name=image_backend["name"],
|
476
|
+
policy_data=admin.policy_data)
|
477
|
+
```
|
478
|
+
|
479
|
+
## compute.BackendBucketIamBinding
|
480
|
+
|
481
|
+
```python
|
482
|
+
import pulumi
|
483
|
+
import pulumi_gcp as gcp
|
484
|
+
|
485
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
486
|
+
project=image_backend["project"],
|
487
|
+
name=image_backend["name"],
|
488
|
+
role="roles/viewer",
|
489
|
+
members=["user:jane@example.com"])
|
490
|
+
```
|
491
|
+
|
492
|
+
## compute.BackendBucketIamMember
|
493
|
+
|
494
|
+
```python
|
495
|
+
import pulumi
|
496
|
+
import pulumi_gcp as gcp
|
497
|
+
|
498
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
499
|
+
project=image_backend["project"],
|
500
|
+
name=image_backend["name"],
|
501
|
+
role="roles/viewer",
|
502
|
+
member="user:jane@example.com")
|
503
|
+
```
|
504
|
+
|
505
|
+
## This resource supports User Project Overrides.
|
506
|
+
|
507
|
+
-
|
508
|
+
|
509
|
+
# IAM policy for Compute Engine BackendBucket
|
510
|
+
|
511
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
512
|
+
|
513
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
514
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
515
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
516
|
+
|
517
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
518
|
+
|
519
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
520
|
+
|
521
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
522
|
+
|
523
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
524
|
+
|
525
|
+
## compute.BackendBucketIamPolicy
|
526
|
+
|
527
|
+
```python
|
528
|
+
import pulumi
|
529
|
+
import pulumi_gcp as gcp
|
530
|
+
|
531
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
532
|
+
"role": "roles/viewer",
|
533
|
+
"members": ["user:jane@example.com"],
|
534
|
+
}])
|
535
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
536
|
+
project=image_backend["project"],
|
537
|
+
name=image_backend["name"],
|
538
|
+
policy_data=admin.policy_data)
|
539
|
+
```
|
540
|
+
|
541
|
+
## compute.BackendBucketIamBinding
|
542
|
+
|
543
|
+
```python
|
544
|
+
import pulumi
|
545
|
+
import pulumi_gcp as gcp
|
546
|
+
|
547
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
548
|
+
project=image_backend["project"],
|
549
|
+
name=image_backend["name"],
|
550
|
+
role="roles/viewer",
|
551
|
+
members=["user:jane@example.com"])
|
552
|
+
```
|
553
|
+
|
554
|
+
## compute.BackendBucketIamMember
|
555
|
+
|
556
|
+
```python
|
557
|
+
import pulumi
|
558
|
+
import pulumi_gcp as gcp
|
559
|
+
|
560
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
561
|
+
project=image_backend["project"],
|
562
|
+
name=image_backend["name"],
|
563
|
+
role="roles/viewer",
|
564
|
+
member="user:jane@example.com")
|
565
|
+
```
|
566
|
+
|
331
567
|
## Import
|
332
568
|
|
333
569
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|