sparse-intern-71089
12/11/2023, 1:14 AMlimited-farmer-68874
12/11/2023, 1:19 AMinvoker_policy = cloudrunv2.JobIamBinding(
"trigger-binding",
name=service_name,
role="roles/run.invoker",
members=[
pulumi.Output.concat(
"serviceAccount:",
sa.service_accounts["service-account"].email,
),
],
)
e.g.limited-farmer-68874
12/11/2023, 1:19 AMminiature-computer-95401
12/11/2023, 7:17 PMminiature-computer-95401
12/11/2023, 7:40 PMmy_function = gcp.cloudfunctionsv2.Function(
"my_function",
...
)
# This has no effect, or results in an operation not permitted depending on whether you use role "roles/cloudfunctions.invoker" or "roles/run.invoker"
my_function_invoker = gcp.cloudfunctionsv2.FunctionIamMember(
"my_function_invoker",
project=my_function.project,
location=my_function.location,
cloud_function=my_function.name,
role="roles/cloudfunctions.invoker",
member="allUsers",
)
# The next two statements have exactly the effect that I desire by setting a policy on the underlying cloud run service
my_iam_policy = gcp.organizations.get_iam_policy(
bindings=[
gcp.organizations.GetIAMPolicyBindingArgs(
role="roles/run.invoker",
members=["allUsers"],
)
]
)
my_iam_policy = gcp.cloudrun.IamPolicy(
"no-auth-IAM-policy",
location=my_function.location,
project=my_function.project,
service=my_function.name,
policy_data=my_iam_policy.policy_data
)
limited-farmer-68874
12/11/2023, 9:16 PMlocation
WOOPS 😂limited-farmer-68874
12/11/2023, 9:17 PM