pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -439,6 +439,27 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
439
439
  })
440
440
  ```
441
441
 
442
+ ## This resource supports User Project Overrides.
443
+
444
+ -
445
+
446
+ # IAM policy for Compute Engine Subnetwork
447
+ Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
448
+
449
+ * `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
450
+ * `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
451
+ * `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
452
+
453
+ A data source can be used to retrieve policy data in advent you do not need creation
454
+
455
+ * `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
456
+
457
+ > **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
458
+
459
+ > **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
460
+
461
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
462
+
442
463
  ## compute.SubnetworkIAMPolicy
443
464
 
444
465
  ```python
@@ -732,6 +753,27 @@ class SubnetworkIAMBinding(pulumi.CustomResource):
732
753
  })
733
754
  ```
734
755
 
756
+ ## This resource supports User Project Overrides.
757
+
758
+ -
759
+
760
+ # IAM policy for Compute Engine Subnetwork
761
+ Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
762
+
763
+ * `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
764
+ * `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
765
+ * `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
766
+
767
+ A data source can be used to retrieve policy data in advent you do not need creation
768
+
769
+ * `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
770
+
771
+ > **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
772
+
773
+ > **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
774
+
775
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
776
+
735
777
  ## compute.SubnetworkIAMPolicy
736
778
 
737
779
  ```python
@@ -439,6 +439,27 @@ class SubnetworkIAMMember(pulumi.CustomResource):
439
439
  })
440
440
  ```
441
441
 
442
+ ## This resource supports User Project Overrides.
443
+
444
+ -
445
+
446
+ # IAM policy for Compute Engine Subnetwork
447
+ Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
448
+
449
+ * `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
450
+ * `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
451
+ * `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
452
+
453
+ A data source can be used to retrieve policy data in advent you do not need creation
454
+
455
+ * `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
456
+
457
+ > **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
458
+
459
+ > **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
460
+
461
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
462
+
442
463
  ## compute.SubnetworkIAMPolicy
443
464
 
444
465
  ```python
@@ -732,6 +753,27 @@ class SubnetworkIAMMember(pulumi.CustomResource):
732
753
  })
733
754
  ```
734
755
 
756
+ ## This resource supports User Project Overrides.
757
+
758
+ -
759
+
760
+ # IAM policy for Compute Engine Subnetwork
761
+ Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
762
+
763
+ * `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
764
+ * `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
765
+ * `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
766
+
767
+ A data source can be used to retrieve policy data in advent you do not need creation
768
+
769
+ * `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
770
+
771
+ > **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
772
+
773
+ > **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
774
+
775
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
776
+
735
777
  ## compute.SubnetworkIAMPolicy
736
778
 
737
779
  ```python
@@ -324,6 +324,27 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
324
324
  })
325
325
  ```
326
326
 
327
+ ## This resource supports User Project Overrides.
328
+
329
+ -
330
+
331
+ # IAM policy for Compute Engine Subnetwork
332
+ Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
333
+
334
+ * `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
335
+ * `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
336
+ * `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
337
+
338
+ A data source can be used to retrieve policy data in advent you do not need creation
339
+
340
+ * `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
341
+
342
+ > **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
343
+
344
+ > **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
345
+
346
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
347
+
327
348
  ## compute.SubnetworkIAMPolicy
328
349
 
329
350
  ```python
@@ -603,6 +624,27 @@ class SubnetworkIAMPolicy(pulumi.CustomResource):
603
624
  })
604
625
  ```
605
626
 
627
+ ## This resource supports User Project Overrides.
628
+
629
+ -
630
+
631
+ # IAM policy for Compute Engine Subnetwork
632
+ Three different resources help you manage your IAM policy for Compute Engine Subnetwork. Each of these resources serves a different use case:
633
+
634
+ * `compute.SubnetworkIAMPolicy`: Authoritative. Sets the IAM policy for the subnetwork and replaces any existing policy already attached.
635
+ * `compute.SubnetworkIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the subnetwork are preserved.
636
+ * `compute.SubnetworkIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the subnetwork are preserved.
637
+
638
+ A data source can be used to retrieve policy data in advent you do not need creation
639
+
640
+ * `compute.SubnetworkIAMPolicy`: Retrieves the IAM policy for the subnetwork
641
+
642
+ > **Note:** `compute.SubnetworkIAMPolicy` **cannot** be used in conjunction with `compute.SubnetworkIAMBinding` and `compute.SubnetworkIAMMember` or they will fight over what your policy should be.
643
+
644
+ > **Note:** `compute.SubnetworkIAMBinding` resources **can be** used in conjunction with `compute.SubnetworkIAMMember` resources **only if** they do not grant privilege to the same role.
645
+
646
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
647
+
606
648
  ## compute.SubnetworkIAMPolicy
607
649
 
608
650
  ```python
@@ -7856,7 +7856,7 @@ if not MYPY:
7856
7856
  """
7857
7857
  relay_mode: NotRequired[pulumi.Input[str]]
7858
7858
  """
7859
- Mode used to make Relay available.
7859
+ Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
7860
7860
  """
7861
7861
  elif False:
7862
7862
  ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgsDict: TypeAlias = Mapping[str, Any]
@@ -7870,7 +7870,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
7870
7870
  """
7871
7871
  :param pulumi.Input[bool] enable_metrics: Whether or not to enable advanced datapath metrics.
7872
7872
  :param pulumi.Input[bool] enable_relay: Whether or not Relay is enabled.
7873
- :param pulumi.Input[str] relay_mode: Mode used to make Relay available.
7873
+ :param pulumi.Input[str] relay_mode: Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
7874
7874
  """
7875
7875
  pulumi.set(__self__, "enable_metrics", enable_metrics)
7876
7876
  if enable_relay is not None:
@@ -7910,7 +7910,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
7910
7910
  @_utilities.deprecated("""Deprecated in favor of enable_relay field. Remove this attribute's configuration as this field will be removed in the next major release and enable_relay will become a required field.""")
7911
7911
  def relay_mode(self) -> Optional[pulumi.Input[str]]:
7912
7912
  """
7913
- Mode used to make Relay available.
7913
+ Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
7914
7914
  """
7915
7915
  return pulumi.get(self, "relay_mode")
7916
7916
 
@@ -6476,7 +6476,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
6476
6476
  """
6477
6477
  :param bool enable_metrics: Whether or not to enable advanced datapath metrics.
6478
6478
  :param bool enable_relay: Whether or not Relay is enabled.
6479
- :param str relay_mode: Mode used to make Relay available.
6479
+ :param str relay_mode: Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
6480
6480
  """
6481
6481
  pulumi.set(__self__, "enable_metrics", enable_metrics)
6482
6482
  if enable_relay is not None:
@@ -6505,7 +6505,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
6505
6505
  @_utilities.deprecated("""Deprecated in favor of enable_relay field. Remove this attribute's configuration as this field will be removed in the next major release and enable_relay will become a required field.""")
6506
6506
  def relay_mode(self) -> Optional[str]:
6507
6507
  """
6508
- Mode used to make Relay available.
6508
+ Mode used to make Relay available. Deprecated in favor of `enable_relay` field. Remove this attribute's configuration as this field will be removed in the next major release and `enable_relay` will become a required field.
6509
6509
  """
6510
6510
  return pulumi.get(self, "relay_mode")
6511
6511
 
@@ -319,6 +319,25 @@ class NoteIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Container Registry Note
327
+ Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
328
+
329
+ * `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
330
+ * `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
331
+ * `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
336
+
337
+ > **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## containeranalysis.NoteIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class NoteIamBinding(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Container Registry Note
507
+ Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
508
+
509
+ * `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
510
+ * `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
511
+ * `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
516
+
517
+ > **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## containeranalysis.NoteIamPolicy
484
522
 
485
523
  ```python
@@ -319,6 +319,25 @@ class NoteIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Container Registry Note
327
+ Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
328
+
329
+ * `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
330
+ * `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
331
+ * `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
336
+
337
+ > **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## containeranalysis.NoteIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class NoteIamMember(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Container Registry Note
507
+ Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
508
+
509
+ * `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
510
+ * `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
511
+ * `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
516
+
517
+ > **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## containeranalysis.NoteIamPolicy
484
522
 
485
523
  ```python
@@ -216,6 +216,25 @@ class NoteIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
+ ## This resource supports User Project Overrides.
220
+
221
+ -
222
+
223
+ # IAM policy for Container Registry Note
224
+ Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
225
+
226
+ * `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
227
+ * `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
228
+ * `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
229
+
230
+ A data source can be used to retrieve policy data in advent you do not need creation
231
+
232
+ * `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
233
+
234
+ > **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
235
+
236
+ > **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
237
+
219
238
  ## containeranalysis.NoteIamPolicy
220
239
 
221
240
  ```python
@@ -365,6 +384,25 @@ class NoteIamPolicy(pulumi.CustomResource):
365
384
  member="user:jane@example.com")
366
385
  ```
367
386
 
387
+ ## This resource supports User Project Overrides.
388
+
389
+ -
390
+
391
+ # IAM policy for Container Registry Note
392
+ Three different resources help you manage your IAM policy for Container Registry Note. Each of these resources serves a different use case:
393
+
394
+ * `containeranalysis.NoteIamPolicy`: Authoritative. Sets the IAM policy for the note and replaces any existing policy already attached.
395
+ * `containeranalysis.NoteIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the note are preserved.
396
+ * `containeranalysis.NoteIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the note are preserved.
397
+
398
+ A data source can be used to retrieve policy data in advent you do not need creation
399
+
400
+ * `containeranalysis.NoteIamPolicy`: Retrieves the IAM policy for the note
401
+
402
+ > **Note:** `containeranalysis.NoteIamPolicy` **cannot** be used in conjunction with `containeranalysis.NoteIamBinding` and `containeranalysis.NoteIamMember` or they will fight over what your policy should be.
403
+
404
+ > **Note:** `containeranalysis.NoteIamBinding` resources **can be** used in conjunction with `containeranalysis.NoteIamMember` resources **only if** they do not grant privilege to the same role.
405
+
368
406
  ## containeranalysis.NoteIamPolicy
369
407
 
370
408
  ```python
@@ -341,6 +341,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
+ ## This resource supports User Project Overrides.
345
+
346
+ -
347
+
348
+ # IAM policy for Data catalog EntryGroup
349
+ Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
350
+
351
+ * `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
352
+ * `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
353
+ * `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
354
+
355
+ A data source can be used to retrieve policy data in advent you do not need creation
356
+
357
+ * `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
358
+
359
+ > **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
360
+
361
+ > **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
362
+
344
363
  ## datacatalog.EntryGroupIamPolicy
345
364
 
346
365
  ```python
@@ -498,6 +517,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
498
517
  member="user:jane@example.com")
499
518
  ```
500
519
 
520
+ ## This resource supports User Project Overrides.
521
+
522
+ -
523
+
524
+ # IAM policy for Data catalog EntryGroup
525
+ Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
526
+
527
+ * `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
528
+ * `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
529
+ * `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
530
+
531
+ A data source can be used to retrieve policy data in advent you do not need creation
532
+
533
+ * `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
534
+
535
+ > **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
536
+
537
+ > **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
538
+
501
539
  ## datacatalog.EntryGroupIamPolicy
502
540
 
503
541
  ```python
@@ -341,6 +341,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
+ ## This resource supports User Project Overrides.
345
+
346
+ -
347
+
348
+ # IAM policy for Data catalog EntryGroup
349
+ Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
350
+
351
+ * `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
352
+ * `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
353
+ * `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
354
+
355
+ A data source can be used to retrieve policy data in advent you do not need creation
356
+
357
+ * `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
358
+
359
+ > **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
360
+
361
+ > **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
362
+
344
363
  ## datacatalog.EntryGroupIamPolicy
345
364
 
346
365
  ```python
@@ -498,6 +517,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
498
517
  member="user:jane@example.com")
499
518
  ```
500
519
 
520
+ ## This resource supports User Project Overrides.
521
+
522
+ -
523
+
524
+ # IAM policy for Data catalog EntryGroup
525
+ Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
526
+
527
+ * `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
528
+ * `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
529
+ * `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
530
+
531
+ A data source can be used to retrieve policy data in advent you do not need creation
532
+
533
+ * `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
534
+
535
+ > **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
536
+
537
+ > **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
538
+
501
539
  ## datacatalog.EntryGroupIamPolicy
502
540
 
503
541
  ```python
@@ -238,6 +238,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
238
238
  member="user:jane@example.com")
239
239
  ```
240
240
 
241
+ ## This resource supports User Project Overrides.
242
+
243
+ -
244
+
245
+ # IAM policy for Data catalog EntryGroup
246
+ Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
247
+
248
+ * `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
249
+ * `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
250
+ * `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
251
+
252
+ A data source can be used to retrieve policy data in advent you do not need creation
253
+
254
+ * `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
255
+
256
+ > **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
257
+
258
+ > **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
259
+
241
260
  ## datacatalog.EntryGroupIamPolicy
242
261
 
243
262
  ```python
@@ -383,6 +402,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
383
402
  member="user:jane@example.com")
384
403
  ```
385
404
 
405
+ ## This resource supports User Project Overrides.
406
+
407
+ -
408
+
409
+ # IAM policy for Data catalog EntryGroup
410
+ Three different resources help you manage your IAM policy for Data catalog EntryGroup. Each of these resources serves a different use case:
411
+
412
+ * `datacatalog.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
413
+ * `datacatalog.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
414
+ * `datacatalog.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
415
+
416
+ A data source can be used to retrieve policy data in advent you do not need creation
417
+
418
+ * `datacatalog.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
419
+
420
+ > **Note:** `datacatalog.EntryGroupIamPolicy` **cannot** be used in conjunction with `datacatalog.EntryGroupIamBinding` and `datacatalog.EntryGroupIamMember` or they will fight over what your policy should be.
421
+
422
+ > **Note:** `datacatalog.EntryGroupIamBinding` resources **can be** used in conjunction with `datacatalog.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
423
+
386
424
  ## datacatalog.EntryGroupIamPolicy
387
425
 
388
426
  ```python
@@ -279,6 +279,26 @@ class PolicyTagIamBinding(pulumi.CustomResource):
279
279
  member="user:jane@example.com")
280
280
  ```
281
281
 
282
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
283
+
284
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
285
+ ---
286
+
287
+ # IAM policy for Data catalog PolicyTag
288
+ Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
289
+
290
+ * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
291
+ * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
292
+ * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
293
+
294
+ A data source can be used to retrieve policy data in advent you do not need creation
295
+
296
+ * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
297
+
298
+ > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
299
+
300
+ > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
301
+
282
302
  ## datacatalog.PolicyTagIamPolicy
283
303
 
284
304
  ```python
@@ -428,6 +448,26 @@ class PolicyTagIamBinding(pulumi.CustomResource):
428
448
  member="user:jane@example.com")
429
449
  ```
430
450
 
451
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
452
+
453
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
454
+ ---
455
+
456
+ # IAM policy for Data catalog PolicyTag
457
+ Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
458
+
459
+ * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
460
+ * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
461
+ * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
462
+
463
+ A data source can be used to retrieve policy data in advent you do not need creation
464
+
465
+ * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
466
+
467
+ > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
468
+
469
+ > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
470
+
431
471
  ## datacatalog.PolicyTagIamPolicy
432
472
 
433
473
  ```python
@@ -279,6 +279,26 @@ class PolicyTagIamMember(pulumi.CustomResource):
279
279
  member="user:jane@example.com")
280
280
  ```
281
281
 
282
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
283
+
284
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
285
+ ---
286
+
287
+ # IAM policy for Data catalog PolicyTag
288
+ Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
289
+
290
+ * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
291
+ * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
292
+ * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
293
+
294
+ A data source can be used to retrieve policy data in advent you do not need creation
295
+
296
+ * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
297
+
298
+ > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
299
+
300
+ > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
301
+
282
302
  ## datacatalog.PolicyTagIamPolicy
283
303
 
284
304
  ```python
@@ -428,6 +448,26 @@ class PolicyTagIamMember(pulumi.CustomResource):
428
448
  member="user:jane@example.com")
429
449
  ```
430
450
 
451
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
452
+
453
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
454
+ ---
455
+
456
+ # IAM policy for Data catalog PolicyTag
457
+ Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
458
+
459
+ * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
460
+ * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
461
+ * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
462
+
463
+ A data source can be used to retrieve policy data in advent you do not need creation
464
+
465
+ * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
466
+
467
+ > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
468
+
469
+ > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
470
+
431
471
  ## datacatalog.PolicyTagIamPolicy
432
472
 
433
473
  ```python