SecretIamMember

Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:

  • gcp.secretmanager.SecretIamPolicy: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
  • gcp.secretmanager.SecretIamBinding: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
  • gcp.secretmanager.SecretIamMember: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.

Note: gcp.secretmanager.SecretIamPolicy cannot be used in conjunction with gcp.secretmanager.SecretIamBinding and gcp.secretmanager.SecretIamMember or they will fight over what your policy should be.

Note: gcp.secretmanager.SecretIamBinding resources can be used in conjunction with gcp.secretmanager.SecretIamMember resources only if they do not grant privilege to the same role.

Create a SecretIamMember Resource

def SecretIamMember(resource_name, opts=None, condition=None, member=None, project=None, role=None, secret_id=None, __props__=None);
name string
The unique name of the resource.
args SecretIamMemberArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
opts ResourceOptions
A bag of options that control this resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args SecretIamMemberArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args SecretIamMemberArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.

SecretIamMember Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.

Inputs

The SecretIamMember resource accepts the following input properties:

Member string
Role string

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

SecretId string
Condition SecretIamMemberConditionArgs
Project string

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

Member string
Role string

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

SecretId string
Condition SecretIamMemberCondition
Project string

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

member string
role string

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

secretId string
condition SecretIamMemberCondition
project string

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

member str
role str

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

secret_id str
condition Dict[SecretIamMemberCondition]
project str

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

Outputs

All input properties are implicitly available as output properties. Additionally, the SecretIamMember resource produces the following output properties:

Etag string

(Computed) The etag of the IAM policy.

Id string
The provider-assigned unique ID for this managed resource.
Etag string

(Computed) The etag of the IAM policy.

Id string
The provider-assigned unique ID for this managed resource.
etag string

(Computed) The etag of the IAM policy.

id string
The provider-assigned unique ID for this managed resource.
etag str

(Computed) The etag of the IAM policy.

id str
The provider-assigned unique ID for this managed resource.

Look up an Existing SecretIamMember Resource

Get an existing SecretIamMember resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: SecretIamMemberState, opts?: CustomResourceOptions): SecretIamMember
static get(resource_name, id, opts=None, condition=None, etag=None, member=None, project=None, role=None, secret_id=None, __props__=None);
func GetSecretIamMember(ctx *Context, name string, id IDInput, state *SecretIamMemberState, opts ...ResourceOption) (*SecretIamMember, error)
public static SecretIamMember Get(string name, Input<string> id, SecretIamMemberState? state, CustomResourceOptions? opts = null)
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.

The following state arguments are supported:

Condition SecretIamMemberConditionArgs
Etag string

(Computed) The etag of the IAM policy.

Member string
Project string

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

Role string

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

SecretId string
Condition SecretIamMemberCondition
Etag string

(Computed) The etag of the IAM policy.

Member string
Project string

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

Role string

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

SecretId string
condition SecretIamMemberCondition
etag string

(Computed) The etag of the IAM policy.

member string
project string

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

role string

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

secretId string
condition Dict[SecretIamMemberCondition]
etag str

(Computed) The etag of the IAM policy.

member str
project str

The ID of the project in which the resource belongs. If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.

role str

The role that should be applied. Only one gcp.secretmanager.SecretIamBinding can be used per role. Note that custom roles must be of the format [projects|organizations]/{parent-name}/roles/{role-name}.

secret_id str

Supporting Types

SecretIamMemberCondition

See the input and output API doc for this type.

See the input and output API doc for this type.

See the input and output API doc for this type.

Expression string
Title string
Description string
Expression string
Title string
Description string
expression string
title string
description string
expression str
title str
description str

Package Details

Repository
https://github.com/pulumi/pulumi-gcp
License
Apache-2.0
Notes
This Pulumi package is based on the google-beta Terraform Provider.