pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -2686,7 +2686,10 @@ if not MYPY:
2686
2686
  """
2687
2687
  A Google Cloud resource that is allowed to ingress the perimeter.
2688
2688
  Requests from these resources will be allowed to access perimeter data.
2689
- Currently only projects are allowed. Format `projects/{project_number}`
2689
+ Currently only projects and VPCs are allowed.
2690
+ Project format: `projects/{projectNumber}`
2691
+ VPC network format:
2692
+ `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
2690
2693
  The project may be in any Google Cloud organization, not just the
2691
2694
  organization that the perimeter is defined in. `*` is not allowed, the case
2692
2695
  of allowing all Google Cloud resources only is not supported.
@@ -2710,7 +2713,10 @@ class ServicePerimeterIngressPolicyIngressFromSourceArgs:
2710
2713
  If * is specified, then all IngressSources will be allowed.
2711
2714
  :param pulumi.Input[str] resource: A Google Cloud resource that is allowed to ingress the perimeter.
2712
2715
  Requests from these resources will be allowed to access perimeter data.
2713
- Currently only projects are allowed. Format `projects/{project_number}`
2716
+ Currently only projects and VPCs are allowed.
2717
+ Project format: `projects/{projectNumber}`
2718
+ VPC network format:
2719
+ `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
2714
2720
  The project may be in any Google Cloud organization, not just the
2715
2721
  organization that the perimeter is defined in. `*` is not allowed, the case
2716
2722
  of allowing all Google Cloud resources only is not supported.
@@ -2745,7 +2751,10 @@ class ServicePerimeterIngressPolicyIngressFromSourceArgs:
2745
2751
  """
2746
2752
  A Google Cloud resource that is allowed to ingress the perimeter.
2747
2753
  Requests from these resources will be allowed to access perimeter data.
2748
- Currently only projects are allowed. Format `projects/{project_number}`
2754
+ Currently only projects and VPCs are allowed.
2755
+ Project format: `projects/{projectNumber}`
2756
+ VPC network format:
2757
+ `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
2749
2758
  The project may be in any Google Cloud organization, not just the
2750
2759
  organization that the perimeter is defined in. `*` is not allowed, the case
2751
2760
  of allowing all Google Cloud resources only is not supported.
@@ -25,13 +25,13 @@ class AccessPolicyArgs:
25
25
  """
26
26
  The set of arguments for constructing a AccessPolicy resource.
27
27
  :param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
28
- Format: organizations/{organization_id}
28
+ Format: 'organizations/{{organization_id}}'
29
29
  :param pulumi.Input[str] title: Human readable title. Does not affect behavior.
30
30
 
31
31
 
32
32
  - - -
33
33
  :param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
34
- Format: folders/{{folder_id}} or projects/{{project_id}}
34
+ Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
35
35
  """
36
36
  pulumi.set(__self__, "parent", parent)
37
37
  pulumi.set(__self__, "title", title)
@@ -43,7 +43,7 @@ class AccessPolicyArgs:
43
43
  def parent(self) -> pulumi.Input[str]:
44
44
  """
45
45
  The parent of this AccessPolicy in the Cloud Resource Hierarchy.
46
- Format: organizations/{organization_id}
46
+ Format: 'organizations/{{organization_id}}'
47
47
  """
48
48
  return pulumi.get(self, "parent")
49
49
 
@@ -71,7 +71,7 @@ class AccessPolicyArgs:
71
71
  def scopes(self) -> Optional[pulumi.Input[str]]:
72
72
  """
73
73
  Folder or project on which this policy is applicable.
74
- Format: folders/{{folder_id}} or projects/{{project_id}}
74
+ Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
75
75
  """
76
76
  return pulumi.get(self, "scopes")
77
77
 
@@ -92,11 +92,11 @@ class _AccessPolicyState:
92
92
  """
93
93
  Input properties used for looking up and filtering AccessPolicy resources.
94
94
  :param pulumi.Input[str] create_time: Time the AccessPolicy was created in UTC.
95
- :param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: {policy_id}
95
+ :param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: '{{policy_id}}'
96
96
  :param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
97
- Format: organizations/{organization_id}
97
+ Format: 'organizations/{{organization_id}}'
98
98
  :param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
99
- Format: folders/{{folder_id}} or projects/{{project_id}}
99
+ Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
100
100
  :param pulumi.Input[str] title: Human readable title. Does not affect behavior.
101
101
 
102
102
 
@@ -132,7 +132,7 @@ class _AccessPolicyState:
132
132
  @pulumi.getter
133
133
  def name(self) -> Optional[pulumi.Input[str]]:
134
134
  """
135
- Resource name of the AccessPolicy. Format: {policy_id}
135
+ Resource name of the AccessPolicy. Format: '{{policy_id}}'
136
136
  """
137
137
  return pulumi.get(self, "name")
138
138
 
@@ -145,7 +145,7 @@ class _AccessPolicyState:
145
145
  def parent(self) -> Optional[pulumi.Input[str]]:
146
146
  """
147
147
  The parent of this AccessPolicy in the Cloud Resource Hierarchy.
148
- Format: organizations/{organization_id}
148
+ Format: 'organizations/{{organization_id}}'
149
149
  """
150
150
  return pulumi.get(self, "parent")
151
151
 
@@ -158,7 +158,7 @@ class _AccessPolicyState:
158
158
  def scopes(self) -> Optional[pulumi.Input[str]]:
159
159
  """
160
160
  Folder or project on which this policy is applicable.
161
- Format: folders/{{folder_id}} or projects/{{project_id}}
161
+ Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
162
162
  """
163
163
  return pulumi.get(self, "scopes")
164
164
 
@@ -265,9 +265,9 @@ class AccessPolicy(pulumi.CustomResource):
265
265
  :param str resource_name: The name of the resource.
266
266
  :param pulumi.ResourceOptions opts: Options for the resource.
267
267
  :param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
268
- Format: organizations/{organization_id}
268
+ Format: 'organizations/{{organization_id}}'
269
269
  :param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
270
- Format: folders/{{folder_id}} or projects/{{project_id}}
270
+ Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
271
271
  :param pulumi.Input[str] title: Human readable title. Does not affect behavior.
272
272
 
273
273
 
@@ -399,11 +399,11 @@ class AccessPolicy(pulumi.CustomResource):
399
399
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
400
400
  :param pulumi.ResourceOptions opts: Options for the resource.
401
401
  :param pulumi.Input[str] create_time: Time the AccessPolicy was created in UTC.
402
- :param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: {policy_id}
402
+ :param pulumi.Input[str] name: Resource name of the AccessPolicy. Format: '{{policy_id}}'
403
403
  :param pulumi.Input[str] parent: The parent of this AccessPolicy in the Cloud Resource Hierarchy.
404
- Format: organizations/{organization_id}
404
+ Format: 'organizations/{{organization_id}}'
405
405
  :param pulumi.Input[str] scopes: Folder or project on which this policy is applicable.
406
- Format: folders/{{folder_id}} or projects/{{project_id}}
406
+ Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
407
407
  :param pulumi.Input[str] title: Human readable title. Does not affect behavior.
408
408
 
409
409
 
@@ -434,7 +434,7 @@ class AccessPolicy(pulumi.CustomResource):
434
434
  @pulumi.getter
435
435
  def name(self) -> pulumi.Output[str]:
436
436
  """
437
- Resource name of the AccessPolicy. Format: {policy_id}
437
+ Resource name of the AccessPolicy. Format: '{{policy_id}}'
438
438
  """
439
439
  return pulumi.get(self, "name")
440
440
 
@@ -443,7 +443,7 @@ class AccessPolicy(pulumi.CustomResource):
443
443
  def parent(self) -> pulumi.Output[str]:
444
444
  """
445
445
  The parent of this AccessPolicy in the Cloud Resource Hierarchy.
446
- Format: organizations/{organization_id}
446
+ Format: 'organizations/{{organization_id}}'
447
447
  """
448
448
  return pulumi.get(self, "parent")
449
449
 
@@ -452,7 +452,7 @@ class AccessPolicy(pulumi.CustomResource):
452
452
  def scopes(self) -> pulumi.Output[Optional[str]]:
453
453
  """
454
454
  Folder or project on which this policy is applicable.
455
- Format: folders/{{folder_id}} or projects/{{project_id}}
455
+ Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
456
456
  """
457
457
  return pulumi.get(self, "scopes")
458
458
 
@@ -280,6 +280,26 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
289
+ Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
290
+
291
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
292
+ * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
293
+ * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
298
+
299
+ > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## accesscontextmanager.AccessPolicyIamPolicy
284
304
 
285
305
  ```python
@@ -431,6 +451,26 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
431
451
  member="user:jane@example.com")
432
452
  ```
433
453
 
454
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
455
+
456
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
457
+ ---
458
+
459
+ # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
460
+ Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
461
+
462
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
463
+ * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
464
+ * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
465
+
466
+ A data source can be used to retrieve policy data in advent you do not need creation
467
+
468
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
469
+
470
+ > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
471
+
472
+ > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
473
+
434
474
  ## accesscontextmanager.AccessPolicyIamPolicy
435
475
 
436
476
  ```python
@@ -280,6 +280,26 @@ class AccessPolicyIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
289
+ Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
290
+
291
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
292
+ * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
293
+ * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
298
+
299
+ > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## accesscontextmanager.AccessPolicyIamPolicy
284
304
 
285
305
  ```python
@@ -431,6 +451,26 @@ class AccessPolicyIamMember(pulumi.CustomResource):
431
451
  member="user:jane@example.com")
432
452
  ```
433
453
 
454
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
455
+
456
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
457
+ ---
458
+
459
+ # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
460
+ Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
461
+
462
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
463
+ * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
464
+ * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
465
+
466
+ A data source can be used to retrieve policy data in advent you do not need creation
467
+
468
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
469
+
470
+ > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
471
+
472
+ > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
473
+
434
474
  ## accesscontextmanager.AccessPolicyIamPolicy
435
475
 
436
476
  ```python
@@ -177,6 +177,26 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
+
182
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
+ ---
184
+
185
+ # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
186
+ Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
187
+
188
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
189
+ * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
190
+ * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
191
+
192
+ A data source can be used to retrieve policy data in advent you do not need creation
193
+
194
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
195
+
196
+ > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
197
+
198
+ > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
199
+
180
200
  ## accesscontextmanager.AccessPolicyIamPolicy
181
201
 
182
202
  ```python
@@ -316,6 +336,26 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
316
336
  member="user:jane@example.com")
317
337
  ```
318
338
 
339
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
340
+
341
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
342
+ ---
343
+
344
+ # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
345
+ Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
346
+
347
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
348
+ * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
349
+ * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
350
+
351
+ A data source can be used to retrieve policy data in advent you do not need creation
352
+
353
+ * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
354
+
355
+ > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
356
+
357
+ > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
358
+
319
359
  ## accesscontextmanager.AccessPolicyIamPolicy
320
360
 
321
361
  ```python
@@ -2049,7 +2049,10 @@ class ServicePerimeterIngressPolicyIngressFromSource(dict):
2049
2049
  If * is specified, then all IngressSources will be allowed.
2050
2050
  :param str resource: A Google Cloud resource that is allowed to ingress the perimeter.
2051
2051
  Requests from these resources will be allowed to access perimeter data.
2052
- Currently only projects are allowed. Format `projects/{project_number}`
2052
+ Currently only projects and VPCs are allowed.
2053
+ Project format: `projects/{projectNumber}`
2054
+ VPC network format:
2055
+ `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
2053
2056
  The project may be in any Google Cloud organization, not just the
2054
2057
  organization that the perimeter is defined in. `*` is not allowed, the case
2055
2058
  of allowing all Google Cloud resources only is not supported.
@@ -2080,7 +2083,10 @@ class ServicePerimeterIngressPolicyIngressFromSource(dict):
2080
2083
  """
2081
2084
  A Google Cloud resource that is allowed to ingress the perimeter.
2082
2085
  Requests from these resources will be allowed to access perimeter data.
2083
- Currently only projects are allowed. Format `projects/{project_number}`
2086
+ Currently only projects and VPCs are allowed.
2087
+ Project format: `projects/{projectNumber}`
2088
+ VPC network format:
2089
+ `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
2084
2090
  The project may be in any Google Cloud organization, not just the
2085
2091
  organization that the perimeter is defined in. `*` is not allowed, the case
2086
2092
  of allowing all Google Cloud resources only is not supported.
@@ -347,6 +347,25 @@ class ApiConfigIamBinding(pulumi.CustomResource):
347
347
  member="user:jane@example.com")
348
348
  ```
349
349
 
350
+ ## This resource supports User Project Overrides.
351
+
352
+ -
353
+
354
+ # IAM policy for API Gateway ApiConfig
355
+ Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
356
+
357
+ * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
358
+ * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
359
+ * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
360
+
361
+ A data source can be used to retrieve policy data in advent you do not need creation
362
+
363
+ * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
364
+
365
+ > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
366
+
367
+ > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
368
+
350
369
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
351
370
 
352
371
  ```python
@@ -511,6 +530,25 @@ class ApiConfigIamBinding(pulumi.CustomResource):
511
530
  member="user:jane@example.com")
512
531
  ```
513
532
 
533
+ ## This resource supports User Project Overrides.
534
+
535
+ -
536
+
537
+ # IAM policy for API Gateway ApiConfig
538
+ Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
539
+
540
+ * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
541
+ * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
542
+ * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
543
+
544
+ A data source can be used to retrieve policy data in advent you do not need creation
545
+
546
+ * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
547
+
548
+ > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
549
+
550
+ > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
551
+
514
552
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
515
553
 
516
554
  ```python
@@ -347,6 +347,25 @@ class ApiConfigIamMember(pulumi.CustomResource):
347
347
  member="user:jane@example.com")
348
348
  ```
349
349
 
350
+ ## This resource supports User Project Overrides.
351
+
352
+ -
353
+
354
+ # IAM policy for API Gateway ApiConfig
355
+ Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
356
+
357
+ * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
358
+ * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
359
+ * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
360
+
361
+ A data source can be used to retrieve policy data in advent you do not need creation
362
+
363
+ * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
364
+
365
+ > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
366
+
367
+ > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
368
+
350
369
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
351
370
 
352
371
  ```python
@@ -511,6 +530,25 @@ class ApiConfigIamMember(pulumi.CustomResource):
511
530
  member="user:jane@example.com")
512
531
  ```
513
532
 
533
+ ## This resource supports User Project Overrides.
534
+
535
+ -
536
+
537
+ # IAM policy for API Gateway ApiConfig
538
+ Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
539
+
540
+ * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
541
+ * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
542
+ * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
543
+
544
+ A data source can be used to retrieve policy data in advent you do not need creation
545
+
546
+ * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
547
+
548
+ > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
549
+
550
+ > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
551
+
514
552
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
515
553
 
516
554
  ```python
@@ -244,6 +244,25 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
244
244
  member="user:jane@example.com")
245
245
  ```
246
246
 
247
+ ## This resource supports User Project Overrides.
248
+
249
+ -
250
+
251
+ # IAM policy for API Gateway ApiConfig
252
+ Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
253
+
254
+ * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
255
+ * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
256
+ * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
257
+
258
+ A data source can be used to retrieve policy data in advent you do not need creation
259
+
260
+ * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
261
+
262
+ > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
263
+
264
+ > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
265
+
247
266
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
248
267
 
249
268
  ```python
@@ -396,6 +415,25 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
396
415
  member="user:jane@example.com")
397
416
  ```
398
417
 
418
+ ## This resource supports User Project Overrides.
419
+
420
+ -
421
+
422
+ # IAM policy for API Gateway ApiConfig
423
+ Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
424
+
425
+ * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
426
+ * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
427
+ * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
428
+
429
+ A data source can be used to retrieve policy data in advent you do not need creation
430
+
431
+ * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
432
+
433
+ > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
434
+
435
+ > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
436
+
399
437
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
400
438
 
401
439
  ```python
@@ -311,6 +311,25 @@ class ApiIamBinding(pulumi.CustomResource):
311
311
  member="user:jane@example.com")
312
312
  ```
313
313
 
314
+ ## This resource supports User Project Overrides.
315
+
316
+ -
317
+
318
+ # IAM policy for API Gateway Api
319
+ Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
320
+
321
+ * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
322
+ * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
323
+ * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
324
+
325
+ A data source can be used to retrieve policy data in advent you do not need creation
326
+
327
+ * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
328
+
329
+ > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
330
+
331
+ > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
332
+
314
333
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
315
334
 
316
335
  ```python
@@ -471,6 +490,25 @@ class ApiIamBinding(pulumi.CustomResource):
471
490
  member="user:jane@example.com")
472
491
  ```
473
492
 
493
+ ## This resource supports User Project Overrides.
494
+
495
+ -
496
+
497
+ # IAM policy for API Gateway Api
498
+ Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
499
+
500
+ * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
501
+ * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
502
+ * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
503
+
504
+ A data source can be used to retrieve policy data in advent you do not need creation
505
+
506
+ * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
507
+
508
+ > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
509
+
510
+ > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
511
+
474
512
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
475
513
 
476
514
  ```python
@@ -311,6 +311,25 @@ class ApiIamMember(pulumi.CustomResource):
311
311
  member="user:jane@example.com")
312
312
  ```
313
313
 
314
+ ## This resource supports User Project Overrides.
315
+
316
+ -
317
+
318
+ # IAM policy for API Gateway Api
319
+ Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
320
+
321
+ * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
322
+ * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
323
+ * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
324
+
325
+ A data source can be used to retrieve policy data in advent you do not need creation
326
+
327
+ * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
328
+
329
+ > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
330
+
331
+ > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
332
+
314
333
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
315
334
 
316
335
  ```python
@@ -471,6 +490,25 @@ class ApiIamMember(pulumi.CustomResource):
471
490
  member="user:jane@example.com")
472
491
  ```
473
492
 
493
+ ## This resource supports User Project Overrides.
494
+
495
+ -
496
+
497
+ # IAM policy for API Gateway Api
498
+ Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
499
+
500
+ * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
501
+ * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
502
+ * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
503
+
504
+ A data source can be used to retrieve policy data in advent you do not need creation
505
+
506
+ * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
507
+
508
+ > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
509
+
510
+ > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
511
+
474
512
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
475
513
 
476
514
  ```python