com.pulumi.gcp.securitycenter.kotlin.V2OrganizationSourceIamBindingArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-gcp-kotlin Show documentation
Show all versions of pulumi-gcp-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.gcp.securitycenter.kotlin
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamBindingArgs.builder
import com.pulumi.gcp.securitycenter.kotlin.inputs.V2OrganizationSourceIamBindingConditionArgs
import com.pulumi.gcp.securitycenter.kotlin.inputs.V2OrganizationSourceIamBindingConditionArgsBuilder
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
* Three different resources help you manage your IAM policy for Security Command Center (SCC)v2 API OrganizationSource. Each of these resources serves a different use case:
* * `gcp.securitycenter.V2OrganizationSourceIamPolicy`: Authoritative. Sets the IAM policy for the organizationsource and replaces any existing policy already attached.
* * `gcp.securitycenter.V2OrganizationSourceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the organizationsource are preserved.
* * `gcp.securitycenter.V2OrganizationSourceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the organizationsource are preserved.
* A data source can be used to retrieve policy data in advent you do not need creation
* * `gcp.securitycenter.V2OrganizationSourceIamPolicy`: Retrieves the IAM policy for the organizationsource
* > **Note:** `gcp.securitycenter.V2OrganizationSourceIamPolicy` **cannot** be used in conjunction with `gcp.securitycenter.V2OrganizationSourceIamBinding` and `gcp.securitycenter.V2OrganizationSourceIamMember` or they will fight over what your policy should be.
* > **Note:** `gcp.securitycenter.V2OrganizationSourceIamBinding` resources **can be** used in conjunction with `gcp.securitycenter.V2OrganizationSourceIamMember` resources **only if** they do not grant privilege to the same role.
* ## gcp.securitycenter.V2OrganizationSourceIamPolicy
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const admin = gcp.organizations.getIAMPolicy({
* bindings: [{
* role: "roles/viewer",
* members: ["user:jane@example.com"],
* }],
* });
* const policy = new gcp.securitycenter.V2OrganizationSourceIamPolicy("policy", {
* source: customSource.name,
* policyData: admin.then(admin => admin.policyData),
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* admin = gcp.organizations.get_iam_policy(bindings=[{
* "role": "roles/viewer",
* "members": ["user:jane@example.com"],
* }])
* policy = gcp.securitycenter.V2OrganizationSourceIamPolicy("policy",
* source=custom_source["name"],
* policy_data=admin.policy_data)
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var admin = Gcp.Organizations.GetIAMPolicy.Invoke(new()
* {
* Bindings = new[]
* {
* new Gcp.Organizations.Inputs.GetIAMPolicyBindingInputArgs
* {
* Role = "roles/viewer",
* Members = new[]
* {
* "user:[email protected]",
* },
* },
* },
* });
* var policy = new Gcp.SecurityCenter.V2OrganizationSourceIamPolicy("policy", new()
* {
* Source = customSource.Name,
* PolicyData = admin.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData),
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/organizations"
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/securitycenter"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* admin, err := organizations.LookupIAMPolicy(ctx, &organizations.LookupIAMPolicyArgs{
* Bindings: []organizations.GetIAMPolicyBinding{
* {
* Role: "roles/viewer",
* Members: []string{
* "user:[email protected]",
* },
* },
* },
* }, nil)
* if err != nil {
* return err
* }
* _, err = securitycenter.NewV2OrganizationSourceIamPolicy(ctx, "policy", &securitycenter.V2OrganizationSourceIamPolicyArgs{
* Source: pulumi.Any(customSource.Name),
* PolicyData: pulumi.String(admin.PolicyData),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.organizations.OrganizationsFunctions;
* import com.pulumi.gcp.organizations.inputs.GetIAMPolicyArgs;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamPolicy;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamPolicyArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* final var admin = OrganizationsFunctions.getIAMPolicy(GetIAMPolicyArgs.builder()
* .bindings(GetIAMPolicyBindingArgs.builder()
* .role("roles/viewer")
* .members("user:[email protected]")
* .build())
* .build());
* var policy = new V2OrganizationSourceIamPolicy("policy", V2OrganizationSourceIamPolicyArgs.builder()
* .source(customSource.name())
* .policyData(admin.applyValue(getIAMPolicyResult -> getIAMPolicyResult.policyData()))
* .build());
* }
* }
* ```
* ```yaml
* resources:
* policy:
* type: gcp:securitycenter:V2OrganizationSourceIamPolicy
* properties:
* source: ${customSource.name}
* policyData: ${admin.policyData}
* variables:
* admin:
* fn::invoke:
* function: gcp:organizations:getIAMPolicy
* arguments:
* bindings:
* - role: roles/viewer
* members:
* - user:[email protected]
* ```
*
* ## gcp.securitycenter.V2OrganizationSourceIamBinding
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const binding = new gcp.securitycenter.V2OrganizationSourceIamBinding("binding", {
* source: customSource.name,
* role: "roles/viewer",
* members: ["user:jane@example.com"],
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* binding = gcp.securitycenter.V2OrganizationSourceIamBinding("binding",
* source=custom_source["name"],
* role="roles/viewer",
* members=["user:jane@example.com"])
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var binding = new Gcp.SecurityCenter.V2OrganizationSourceIamBinding("binding", new()
* {
* Source = customSource.Name,
* Role = "roles/viewer",
* Members = new[]
* {
* "user:[email protected]",
* },
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/securitycenter"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := securitycenter.NewV2OrganizationSourceIamBinding(ctx, "binding", &securitycenter.V2OrganizationSourceIamBindingArgs{
* Source: pulumi.Any(customSource.Name),
* Role: pulumi.String("roles/viewer"),
* Members: pulumi.StringArray{
* pulumi.String("user:[email protected]"),
* },
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamBinding;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamBindingArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var binding = new V2OrganizationSourceIamBinding("binding", V2OrganizationSourceIamBindingArgs.builder()
* .source(customSource.name())
* .role("roles/viewer")
* .members("user:[email protected]")
* .build());
* }
* }
* ```
* ```yaml
* resources:
* binding:
* type: gcp:securitycenter:V2OrganizationSourceIamBinding
* properties:
* source: ${customSource.name}
* role: roles/viewer
* members:
* - user:[email protected]
* ```
*
* ## gcp.securitycenter.V2OrganizationSourceIamMember
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const member = new gcp.securitycenter.V2OrganizationSourceIamMember("member", {
* source: customSource.name,
* role: "roles/viewer",
* member: "user:[email protected]",
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* member = gcp.securitycenter.V2OrganizationSourceIamMember("member",
* source=custom_source["name"],
* role="roles/viewer",
* member="user:[email protected]")
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var member = new Gcp.SecurityCenter.V2OrganizationSourceIamMember("member", new()
* {
* Source = customSource.Name,
* Role = "roles/viewer",
* Member = "user:[email protected]",
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/securitycenter"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := securitycenter.NewV2OrganizationSourceIamMember(ctx, "member", &securitycenter.V2OrganizationSourceIamMemberArgs{
* Source: pulumi.Any(customSource.Name),
* Role: pulumi.String("roles/viewer"),
* Member: pulumi.String("user:[email protected]"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamMember;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamMemberArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var member = new V2OrganizationSourceIamMember("member", V2OrganizationSourceIamMemberArgs.builder()
* .source(customSource.name())
* .role("roles/viewer")
* .member("user:[email protected]")
* .build());
* }
* }
* ```
* ```yaml
* resources:
* member:
* type: gcp:securitycenter:V2OrganizationSourceIamMember
* properties:
* source: ${customSource.name}
* role: roles/viewer
* member: user:[email protected]
* ```
*
* ## > **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
* full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
* -
* # IAM policy for Security Command Center (SCC)v2 API OrganizationSource
* Three different resources help you manage your IAM policy for Security Command Center (SCC)v2 API OrganizationSource. Each of these resources serves a different use case:
* * `gcp.securitycenter.V2OrganizationSourceIamPolicy`: Authoritative. Sets the IAM policy for the organizationsource and replaces any existing policy already attached.
* * `gcp.securitycenter.V2OrganizationSourceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the organizationsource are preserved.
* * `gcp.securitycenter.V2OrganizationSourceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the organizationsource are preserved.
* A data source can be used to retrieve policy data in advent you do not need creation
* * `gcp.securitycenter.V2OrganizationSourceIamPolicy`: Retrieves the IAM policy for the organizationsource
* > **Note:** `gcp.securitycenter.V2OrganizationSourceIamPolicy` **cannot** be used in conjunction with `gcp.securitycenter.V2OrganizationSourceIamBinding` and `gcp.securitycenter.V2OrganizationSourceIamMember` or they will fight over what your policy should be.
* > **Note:** `gcp.securitycenter.V2OrganizationSourceIamBinding` resources **can be** used in conjunction with `gcp.securitycenter.V2OrganizationSourceIamMember` resources **only if** they do not grant privilege to the same role.
* ## gcp.securitycenter.V2OrganizationSourceIamPolicy
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const admin = gcp.organizations.getIAMPolicy({
* bindings: [{
* role: "roles/viewer",
* members: ["user:jane@example.com"],
* }],
* });
* const policy = new gcp.securitycenter.V2OrganizationSourceIamPolicy("policy", {
* source: customSource.name,
* policyData: admin.then(admin => admin.policyData),
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* admin = gcp.organizations.get_iam_policy(bindings=[{
* "role": "roles/viewer",
* "members": ["user:jane@example.com"],
* }])
* policy = gcp.securitycenter.V2OrganizationSourceIamPolicy("policy",
* source=custom_source["name"],
* policy_data=admin.policy_data)
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var admin = Gcp.Organizations.GetIAMPolicy.Invoke(new()
* {
* Bindings = new[]
* {
* new Gcp.Organizations.Inputs.GetIAMPolicyBindingInputArgs
* {
* Role = "roles/viewer",
* Members = new[]
* {
* "user:[email protected]",
* },
* },
* },
* });
* var policy = new Gcp.SecurityCenter.V2OrganizationSourceIamPolicy("policy", new()
* {
* Source = customSource.Name,
* PolicyData = admin.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData),
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/organizations"
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/securitycenter"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* admin, err := organizations.LookupIAMPolicy(ctx, &organizations.LookupIAMPolicyArgs{
* Bindings: []organizations.GetIAMPolicyBinding{
* {
* Role: "roles/viewer",
* Members: []string{
* "user:[email protected]",
* },
* },
* },
* }, nil)
* if err != nil {
* return err
* }
* _, err = securitycenter.NewV2OrganizationSourceIamPolicy(ctx, "policy", &securitycenter.V2OrganizationSourceIamPolicyArgs{
* Source: pulumi.Any(customSource.Name),
* PolicyData: pulumi.String(admin.PolicyData),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.organizations.OrganizationsFunctions;
* import com.pulumi.gcp.organizations.inputs.GetIAMPolicyArgs;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamPolicy;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamPolicyArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* final var admin = OrganizationsFunctions.getIAMPolicy(GetIAMPolicyArgs.builder()
* .bindings(GetIAMPolicyBindingArgs.builder()
* .role("roles/viewer")
* .members("user:[email protected]")
* .build())
* .build());
* var policy = new V2OrganizationSourceIamPolicy("policy", V2OrganizationSourceIamPolicyArgs.builder()
* .source(customSource.name())
* .policyData(admin.applyValue(getIAMPolicyResult -> getIAMPolicyResult.policyData()))
* .build());
* }
* }
* ```
* ```yaml
* resources:
* policy:
* type: gcp:securitycenter:V2OrganizationSourceIamPolicy
* properties:
* source: ${customSource.name}
* policyData: ${admin.policyData}
* variables:
* admin:
* fn::invoke:
* function: gcp:organizations:getIAMPolicy
* arguments:
* bindings:
* - role: roles/viewer
* members:
* - user:[email protected]
* ```
*
* ## gcp.securitycenter.V2OrganizationSourceIamBinding
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const binding = new gcp.securitycenter.V2OrganizationSourceIamBinding("binding", {
* source: customSource.name,
* role: "roles/viewer",
* members: ["user:jane@example.com"],
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* binding = gcp.securitycenter.V2OrganizationSourceIamBinding("binding",
* source=custom_source["name"],
* role="roles/viewer",
* members=["user:jane@example.com"])
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var binding = new Gcp.SecurityCenter.V2OrganizationSourceIamBinding("binding", new()
* {
* Source = customSource.Name,
* Role = "roles/viewer",
* Members = new[]
* {
* "user:[email protected]",
* },
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/securitycenter"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := securitycenter.NewV2OrganizationSourceIamBinding(ctx, "binding", &securitycenter.V2OrganizationSourceIamBindingArgs{
* Source: pulumi.Any(customSource.Name),
* Role: pulumi.String("roles/viewer"),
* Members: pulumi.StringArray{
* pulumi.String("user:[email protected]"),
* },
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamBinding;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamBindingArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var binding = new V2OrganizationSourceIamBinding("binding", V2OrganizationSourceIamBindingArgs.builder()
* .source(customSource.name())
* .role("roles/viewer")
* .members("user:[email protected]")
* .build());
* }
* }
* ```
* ```yaml
* resources:
* binding:
* type: gcp:securitycenter:V2OrganizationSourceIamBinding
* properties:
* source: ${customSource.name}
* role: roles/viewer
* members:
* - user:[email protected]
* ```
*
* ## gcp.securitycenter.V2OrganizationSourceIamMember
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const member = new gcp.securitycenter.V2OrganizationSourceIamMember("member", {
* source: customSource.name,
* role: "roles/viewer",
* member: "user:[email protected]",
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* member = gcp.securitycenter.V2OrganizationSourceIamMember("member",
* source=custom_source["name"],
* role="roles/viewer",
* member="user:[email protected]")
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var member = new Gcp.SecurityCenter.V2OrganizationSourceIamMember("member", new()
* {
* Source = customSource.Name,
* Role = "roles/viewer",
* Member = "user:[email protected]",
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/securitycenter"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := securitycenter.NewV2OrganizationSourceIamMember(ctx, "member", &securitycenter.V2OrganizationSourceIamMemberArgs{
* Source: pulumi.Any(customSource.Name),
* Role: pulumi.String("roles/viewer"),
* Member: pulumi.String("user:[email protected]"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamMember;
* import com.pulumi.gcp.securitycenter.V2OrganizationSourceIamMemberArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var member = new V2OrganizationSourceIamMember("member", V2OrganizationSourceIamMemberArgs.builder()
* .source(customSource.name())
* .role("roles/viewer")
* .member("user:[email protected]")
* .build());
* }
* }
* ```
* ```yaml
* resources:
* member:
* type: gcp:securitycenter:V2OrganizationSourceIamMember
* properties:
* source: ${customSource.name}
* role: roles/viewer
* member: user:[email protected]
* ```
*
* ## Import
* For all import syntaxes, the "resource in question" can take any of the following forms:
* * organizations/{{organization}}/sources/{{source}}
* * {{organization}}/{{source}}
* * {{source}}
* Any variables not passed in the import command will be taken from the provider configuration.
* Security Command Center (SCC)v2 API organizationsource IAM resources can be imported using the resource identifiers, role, and member.
* IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
* ```sh
* $ pulumi import gcp:securitycenter/v2OrganizationSourceIamBinding:V2OrganizationSourceIamBinding editor "organizations/{{organization}}/sources/{{source}} roles/viewer user:[email protected]"
* ```
* IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
* ```sh
* $ pulumi import gcp:securitycenter/v2OrganizationSourceIamBinding:V2OrganizationSourceIamBinding editor "organizations/{{organization}}/sources/{{source}} roles/viewer"
* ```
* IAM policy imports use the identifier of the resource in question, e.g.
* ```sh
* $ pulumi import gcp:securitycenter/v2OrganizationSourceIamBinding:V2OrganizationSourceIamBinding editor organizations/{{organization}}/sources/{{source}}
* ```
* -> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
* full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
* @property condition
* @property members Identities that will be granted the privilege in `role`.
* Each entry can have one of the following values:
* * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
* * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
* * **user:{emailid}**: An email address that represents a specific Google account. For example, [email protected] or [email protected].
* * **serviceAccount:{emailid}**: An email address that represents a service account. For example, [email protected].
* * **group:{emailid}**: An email address that represents a Google group. For example, [email protected].
* * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
* * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
* * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
* * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
* @property organization
* @property role The role that should be applied. Only one
* `gcp.securitycenter.V2OrganizationSourceIamBinding` can be used per role. Note that custom roles must be of the format
* `[projects|organizations]/{parent-name}/roles/{role-name}`.
* @property source Used to find the parent resource to bind the IAM policy to
*/
public data class V2OrganizationSourceIamBindingArgs(
public val condition: Output? = null,
public val members: Output>? = null,
public val organization: Output? = null,
public val role: Output? = null,
public val source: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.gcp.securitycenter.V2OrganizationSourceIamBindingArgs =
com.pulumi.gcp.securitycenter.V2OrganizationSourceIamBindingArgs.builder()
.condition(condition?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.members(members?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.organization(organization?.applyValue({ args0 -> args0 }))
.role(role?.applyValue({ args0 -> args0 }))
.source(source?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [V2OrganizationSourceIamBindingArgs].
*/
@PulumiTagMarker
public class V2OrganizationSourceIamBindingArgsBuilder internal constructor() {
private var condition: Output? = null
private var members: Output>? = null
private var organization: Output? = null
private var role: Output? = null
private var source: Output? = null
/**
* @param value
*/
@JvmName("madkoipokwahnifh")
public suspend fun condition(`value`: Output) {
this.condition = value
}
/**
* @param value Identities that will be granted the privilege in `role`.
* Each entry can have one of the following values:
* * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
* * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
* * **user:{emailid}**: An email address that represents a specific Google account. For example, [email protected] or [email protected].
* * **serviceAccount:{emailid}**: An email address that represents a service account. For example, [email protected].
* * **group:{emailid}**: An email address that represents a Google group. For example, [email protected].
* * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
* * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
* * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
* * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
*/
@JvmName("hwycosdooecksewg")
public suspend fun members(`value`: Output>) {
this.members = value
}
@JvmName("ywvhitseuhuxlqbx")
public suspend fun members(vararg values: Output) {
this.members = Output.all(values.asList())
}
/**
* @param values Identities that will be granted the privilege in `role`.
* Each entry can have one of the following values:
* * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
* * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
* * **user:{emailid}**: An email address that represents a specific Google account. For example, [email protected] or [email protected].
* * **serviceAccount:{emailid}**: An email address that represents a service account. For example, [email protected].
* * **group:{emailid}**: An email address that represents a Google group. For example, [email protected].
* * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
* * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
* * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
* * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
*/
@JvmName("haosdxipjdspnhch")
public suspend fun members(values: List
© 2015 - 2025 Weber Informatics LLC | Privacy Policy