IAMBinding Args
When managing IAM roles, you can treat a service account either as a resource or as an identity. This resource is to add iam policy bindings to a service account resource, such as allowing the members to run operations as or modify the service account. To configure permissions for a service account on other GCP resources, use the google_project_iam set of resources. Three different resources help you manage your IAM policy for a service account. Each of these resources serves a different use case:
gcp.serviceAccount.IAMPolicy
: Authoritative. Sets the IAM policy for the service account and replaces any existing policy already attached.gcp.serviceAccount.IAMBinding
: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service account are preserved.gcp.serviceAccount.IAMMember
: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service account are preserved.
Note:
gcp.serviceAccount.IAMPolicy
cannot be used in conjunction withgcp.serviceAccount.IAMBinding
andgcp.serviceAccount.IAMMember
or they will fight over what your policy should be. Note:gcp.serviceAccount.IAMBinding
resources can be used in conjunction withgcp.serviceAccount.IAMMember
resources only if they do not grant privilege to the same role.
Example Usage
Service Account IAM Policy
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.organizations.OrganizationsFunctions;
import com.pulumi.gcp.organizations.inputs.GetIAMPolicyArgs;
import com.pulumi.gcp.serviceAccount.Account;
import com.pulumi.gcp.serviceAccount.AccountArgs;
import com.pulumi.gcp.serviceAccount.IAMPolicy;
import com.pulumi.gcp.serviceAccount.IAMPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var admin = OrganizationsFunctions.getIAMPolicy(GetIAMPolicyArgs.builder()
.bindings(GetIAMPolicyBindingArgs.builder()
.role("roles/iam.serviceAccountUser")
.members("user:jane@example.com")
.build())
.build());
var sa = new Account("sa", AccountArgs.builder()
.accountId("my-service-account")
.displayName("A service account that only Jane can interact with")
.build());
var admin_account_iam = new IAMPolicy("admin-account-iam", IAMPolicyArgs.builder()
.serviceAccountId(sa.name())
.policyData(admin.applyValue(getIAMPolicyResult -> getIAMPolicyResult.policyData()))
.build());
}
}
Service Account IAM Binding
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.serviceAccount.Account;
import com.pulumi.gcp.serviceAccount.AccountArgs;
import com.pulumi.gcp.serviceAccount.IAMBinding;
import com.pulumi.gcp.serviceAccount.IAMBindingArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var sa = new Account("sa", AccountArgs.builder()
.accountId("my-service-account")
.displayName("A service account that only Jane can use")
.build());
var admin_account_iam = new IAMBinding("admin-account-iam", IAMBindingArgs.builder()
.serviceAccountId(sa.name())
.role("roles/iam.serviceAccountUser")
.members("user:jane@example.com")
.build());
}
}
Service Account IAM Binding With IAM Conditions:
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.serviceAccount.Account;
import com.pulumi.gcp.serviceAccount.AccountArgs;
import com.pulumi.gcp.serviceAccount.IAMBinding;
import com.pulumi.gcp.serviceAccount.IAMBindingArgs;
import com.pulumi.gcp.serviceAccount.inputs.IAMBindingConditionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var sa = new Account("sa", AccountArgs.builder()
.accountId("my-service-account")
.displayName("A service account that only Jane can use")
.build());
var admin_account_iam = new IAMBinding("admin-account-iam", IAMBindingArgs.builder()
.serviceAccountId(sa.name())
.role("roles/iam.serviceAccountUser")
.members("user:jane@example.com")
.condition(IAMBindingConditionArgs.builder()
.title("expires_after_2019_12_31")
.description("Expiring at midnight of 2019-12-31")
.expression("request.time < timestamp(\"2020-01-01T00:00:00Z\")")
.build())
.build());
}
}
Service Account IAM Member
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.ComputeFunctions;
import com.pulumi.gcp.compute.inputs.GetDefaultServiceAccountArgs;
import com.pulumi.gcp.serviceAccount.Account;
import com.pulumi.gcp.serviceAccount.AccountArgs;
import com.pulumi.gcp.serviceAccount.IAMMember;
import com.pulumi.gcp.serviceAccount.IAMMemberArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var default = ComputeFunctions.getDefaultServiceAccount();
var sa = new Account("sa", AccountArgs.builder()
.accountId("my-service-account")
.displayName("A service account that Jane can use")
.build());
var admin_account_iam = new IAMMember("admin-account-iam", IAMMemberArgs.builder()
.serviceAccountId(sa.name())
.role("roles/iam.serviceAccountUser")
.member("user:jane@example.com")
.build());
var gce_default_account_iam = new IAMMember("gce-default-account-iam", IAMMemberArgs.builder()
.serviceAccountId(default_.name())
.role("roles/iam.serviceAccountUser")
.member(sa.email().applyValue(email -> String.format("serviceAccount:%s", email)))
.build());
}
}
Service Account IAM Member With IAM Conditions:
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.serviceAccount.Account;
import com.pulumi.gcp.serviceAccount.AccountArgs;
import com.pulumi.gcp.serviceAccount.IAMMember;
import com.pulumi.gcp.serviceAccount.IAMMemberArgs;
import com.pulumi.gcp.serviceAccount.inputs.IAMMemberConditionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var sa = new Account("sa", AccountArgs.builder()
.accountId("my-service-account")
.displayName("A service account that Jane can use")
.build());
var admin_account_iam = new IAMMember("admin-account-iam", IAMMemberArgs.builder()
.serviceAccountId(sa.name())
.role("roles/iam.serviceAccountUser")
.member("user:jane@example.com")
.condition(IAMMemberConditionArgs.builder()
.title("expires_after_2019_12_31")
.description("Expiring at midnight of 2019-12-31")
.expression("request.time < timestamp(\"2020-01-01T00:00:00Z\")")
.build())
.build());
}
}
Import
Service account IAM resources can be imported using the project, service account email, role, member identity, and condition (beta).
$ pulumi import gcp:serviceAccount/iAMBinding:IAMBinding admin-account-iam projects/{your-project-id}/serviceAccounts/{your-service-account-email}
$ pulumi import gcp:serviceAccount/iAMBinding:IAMBinding admin-account-iam "projects/{your-project-id}/serviceAccounts/{your-service-account-email} roles/iam.serviceAccountUser"
$ pulumi import gcp:serviceAccount/iAMBinding:IAMBinding admin-account-iam "projects/{your-project-id}/serviceAccounts/{your-service-account-email} roles/editor user:foo@example.com"
->Custom RolesIf you're importing a IAM resource with a custom role, make sure to use the full name of the custom role, e.g. [projects/my-project|organizations/my-org]/roles/my-custom-role
. With conditions
$ pulumi import gcp:serviceAccount/iAMBinding:IAMBinding admin-account-iam "projects/{your-project-id}/serviceAccounts/{your-service-account-email} roles/iam.serviceAccountUser expires_after_2019_12_31"
$ pulumi import gcp:serviceAccount/iAMBinding:IAMBinding admin-account-iam "projects/{your-project-id}/serviceAccounts/{your-service-account-email} roles/iam.serviceAccountUser user:foo@example.com expires_after_2019_12_31"
Constructors
Properties
An IAM Condition for a given binding. Structure is documented below.
The fully-qualified name of the service account to apply policy to.