pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -176,6 +176,26 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
176
176
  member="user:jane@example.com")
177
177
  ```
178
178
 
179
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
180
+
181
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
182
+ ---
183
+
184
+ # IAM policy for Data catalog PolicyTag
185
+ Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
186
+
187
+ * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
188
+ * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
189
+ * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
190
+
191
+ A data source can be used to retrieve policy data in advent you do not need creation
192
+
193
+ * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
194
+
195
+ > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
196
+
197
+ > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
198
+
179
199
  ## datacatalog.PolicyTagIamPolicy
180
200
 
181
201
  ```python
@@ -313,6 +333,26 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
313
333
  member="user:jane@example.com")
314
334
  ```
315
335
 
336
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
337
+
338
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
339
+ ---
340
+
341
+ # IAM policy for Data catalog PolicyTag
342
+ Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
343
+
344
+ * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
345
+ * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
346
+ * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
347
+
348
+ A data source can be used to retrieve policy data in advent you do not need creation
349
+
350
+ * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
351
+
352
+ > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
353
+
354
+ > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
355
+
316
356
  ## datacatalog.PolicyTagIamPolicy
317
357
 
318
358
  ```python
@@ -341,6 +341,25 @@ class TagTemplateIamBinding(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
+ ## This resource supports User Project Overrides.
345
+
346
+ -
347
+
348
+ # IAM policy for Data catalog TagTemplate
349
+ Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
350
+
351
+ * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
352
+ * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
353
+ * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
354
+
355
+ A data source can be used to retrieve policy data in advent you do not need creation
356
+
357
+ * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
358
+
359
+ > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
360
+
361
+ > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
362
+
344
363
  ## datacatalog.TagTemplateIamPolicy
345
364
 
346
365
  ```python
@@ -498,6 +517,25 @@ class TagTemplateIamBinding(pulumi.CustomResource):
498
517
  member="user:jane@example.com")
499
518
  ```
500
519
 
520
+ ## This resource supports User Project Overrides.
521
+
522
+ -
523
+
524
+ # IAM policy for Data catalog TagTemplate
525
+ Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
526
+
527
+ * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
528
+ * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
529
+ * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
530
+
531
+ A data source can be used to retrieve policy data in advent you do not need creation
532
+
533
+ * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
534
+
535
+ > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
536
+
537
+ > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
538
+
501
539
  ## datacatalog.TagTemplateIamPolicy
502
540
 
503
541
  ```python
@@ -341,6 +341,25 @@ class TagTemplateIamMember(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
+ ## This resource supports User Project Overrides.
345
+
346
+ -
347
+
348
+ # IAM policy for Data catalog TagTemplate
349
+ Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
350
+
351
+ * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
352
+ * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
353
+ * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
354
+
355
+ A data source can be used to retrieve policy data in advent you do not need creation
356
+
357
+ * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
358
+
359
+ > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
360
+
361
+ > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
362
+
344
363
  ## datacatalog.TagTemplateIamPolicy
345
364
 
346
365
  ```python
@@ -498,6 +517,25 @@ class TagTemplateIamMember(pulumi.CustomResource):
498
517
  member="user:jane@example.com")
499
518
  ```
500
519
 
520
+ ## This resource supports User Project Overrides.
521
+
522
+ -
523
+
524
+ # IAM policy for Data catalog TagTemplate
525
+ Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
526
+
527
+ * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
528
+ * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
529
+ * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
530
+
531
+ A data source can be used to retrieve policy data in advent you do not need creation
532
+
533
+ * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
534
+
535
+ > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
536
+
537
+ > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
538
+
501
539
  ## datacatalog.TagTemplateIamPolicy
502
540
 
503
541
  ```python
@@ -238,6 +238,25 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
238
238
  member="user:jane@example.com")
239
239
  ```
240
240
 
241
+ ## This resource supports User Project Overrides.
242
+
243
+ -
244
+
245
+ # IAM policy for Data catalog TagTemplate
246
+ Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
247
+
248
+ * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
249
+ * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
250
+ * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
251
+
252
+ A data source can be used to retrieve policy data in advent you do not need creation
253
+
254
+ * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
255
+
256
+ > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
257
+
258
+ > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
259
+
241
260
  ## datacatalog.TagTemplateIamPolicy
242
261
 
243
262
  ```python
@@ -383,6 +402,25 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
383
402
  member="user:jane@example.com")
384
403
  ```
385
404
 
405
+ ## This resource supports User Project Overrides.
406
+
407
+ -
408
+
409
+ # IAM policy for Data catalog TagTemplate
410
+ Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
411
+
412
+ * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
413
+ * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
414
+ * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
415
+
416
+ A data source can be used to retrieve policy data in advent you do not need creation
417
+
418
+ * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
419
+
420
+ > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
421
+
422
+ > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
423
+
386
424
  ## datacatalog.TagTemplateIamPolicy
387
425
 
388
426
  ```python
@@ -341,6 +341,25 @@ class TaxonomyIamBinding(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
+ ## This resource supports User Project Overrides.
345
+
346
+ -
347
+
348
+ # IAM policy for Data catalog Taxonomy
349
+ Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
350
+
351
+ * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
352
+ * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
353
+ * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
354
+
355
+ A data source can be used to retrieve policy data in advent you do not need creation
356
+
357
+ * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
358
+
359
+ > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
360
+
361
+ > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
362
+
344
363
  ## datacatalog.TaxonomyIamPolicy
345
364
 
346
365
  ```python
@@ -498,6 +517,25 @@ class TaxonomyIamBinding(pulumi.CustomResource):
498
517
  member="user:jane@example.com")
499
518
  ```
500
519
 
520
+ ## This resource supports User Project Overrides.
521
+
522
+ -
523
+
524
+ # IAM policy for Data catalog Taxonomy
525
+ Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
526
+
527
+ * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
528
+ * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
529
+ * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
530
+
531
+ A data source can be used to retrieve policy data in advent you do not need creation
532
+
533
+ * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
534
+
535
+ > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
536
+
537
+ > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
538
+
501
539
  ## datacatalog.TaxonomyIamPolicy
502
540
 
503
541
  ```python
@@ -341,6 +341,25 @@ class TaxonomyIamMember(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
+ ## This resource supports User Project Overrides.
345
+
346
+ -
347
+
348
+ # IAM policy for Data catalog Taxonomy
349
+ Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
350
+
351
+ * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
352
+ * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
353
+ * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
354
+
355
+ A data source can be used to retrieve policy data in advent you do not need creation
356
+
357
+ * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
358
+
359
+ > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
360
+
361
+ > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
362
+
344
363
  ## datacatalog.TaxonomyIamPolicy
345
364
 
346
365
  ```python
@@ -498,6 +517,25 @@ class TaxonomyIamMember(pulumi.CustomResource):
498
517
  member="user:jane@example.com")
499
518
  ```
500
519
 
520
+ ## This resource supports User Project Overrides.
521
+
522
+ -
523
+
524
+ # IAM policy for Data catalog Taxonomy
525
+ Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
526
+
527
+ * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
528
+ * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
529
+ * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
530
+
531
+ A data source can be used to retrieve policy data in advent you do not need creation
532
+
533
+ * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
534
+
535
+ > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
536
+
537
+ > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
538
+
501
539
  ## datacatalog.TaxonomyIamPolicy
502
540
 
503
541
  ```python
@@ -238,6 +238,25 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
238
238
  member="user:jane@example.com")
239
239
  ```
240
240
 
241
+ ## This resource supports User Project Overrides.
242
+
243
+ -
244
+
245
+ # IAM policy for Data catalog Taxonomy
246
+ Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
247
+
248
+ * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
249
+ * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
250
+ * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
251
+
252
+ A data source can be used to retrieve policy data in advent you do not need creation
253
+
254
+ * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
255
+
256
+ > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
257
+
258
+ > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
259
+
241
260
  ## datacatalog.TaxonomyIamPolicy
242
261
 
243
262
  ```python
@@ -383,6 +402,25 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
383
402
  member="user:jane@example.com")
384
403
  ```
385
404
 
405
+ ## This resource supports User Project Overrides.
406
+
407
+ -
408
+
409
+ # IAM policy for Data catalog Taxonomy
410
+ Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
411
+
412
+ * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
413
+ * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
414
+ * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
415
+
416
+ A data source can be used to retrieve policy data in advent you do not need creation
417
+
418
+ * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
419
+
420
+ > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
421
+
422
+ > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
423
+
386
424
  ## datacatalog.TaxonomyIamPolicy
387
425
 
388
426
  ```python
@@ -359,6 +359,25 @@ class AspectTypeIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex AspectType
367
+ Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
370
+ * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
371
+ * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
376
+
377
+ > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.AspectTypeIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class AspectTypeIamBinding(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex AspectType
558
+ Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
561
+ * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
562
+ * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
567
+
568
+ > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.AspectTypeIamPolicy
535
573
 
536
574
  ```python
@@ -359,6 +359,25 @@ class AspectTypeIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex AspectType
367
+ Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
370
+ * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
371
+ * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
376
+
377
+ > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.AspectTypeIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class AspectTypeIamMember(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex AspectType
558
+ Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
561
+ * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
562
+ * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
567
+
568
+ > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.AspectTypeIamPolicy
535
573
 
536
574
  ```python
@@ -256,6 +256,25 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
+ ## This resource supports User Project Overrides.
260
+
261
+ -
262
+
263
+ # IAM policy for Dataplex AspectType
264
+ Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
265
+
266
+ * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
267
+ * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
268
+ * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
269
+
270
+ A data source can be used to retrieve policy data in advent you do not need creation
271
+
272
+ * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
273
+
274
+ > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
275
+
276
+ > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
277
+
259
278
  ## dataplex.AspectTypeIamPolicy
260
279
 
261
280
  ```python
@@ -416,6 +435,25 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
416
435
  member="user:jane@example.com")
417
436
  ```
418
437
 
438
+ ## This resource supports User Project Overrides.
439
+
440
+ -
441
+
442
+ # IAM policy for Dataplex AspectType
443
+ Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
444
+
445
+ * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
446
+ * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
447
+ * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
448
+
449
+ A data source can be used to retrieve policy data in advent you do not need creation
450
+
451
+ * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
452
+
453
+ > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
454
+
455
+ > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
456
+
419
457
  ## dataplex.AspectTypeIamPolicy
420
458
 
421
459
  ```python
@@ -401,6 +401,25 @@ class AssetIamBinding(pulumi.CustomResource):
401
401
  member="user:jane@example.com")
402
402
  ```
403
403
 
404
+ ## This resource supports User Project Overrides.
405
+
406
+ -
407
+
408
+ # IAM policy for Dataplex Asset
409
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
410
+
411
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
412
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
413
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
414
+
415
+ A data source can be used to retrieve policy data in advent you do not need creation
416
+
417
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
418
+
419
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
420
+
421
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
422
+
404
423
  ## dataplex.AssetIamPolicy
405
424
 
406
425
  ```python
@@ -582,6 +601,25 @@ class AssetIamBinding(pulumi.CustomResource):
582
601
  member="user:jane@example.com")
583
602
  ```
584
603
 
604
+ ## This resource supports User Project Overrides.
605
+
606
+ -
607
+
608
+ # IAM policy for Dataplex Asset
609
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
610
+
611
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
612
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
613
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
614
+
615
+ A data source can be used to retrieve policy data in advent you do not need creation
616
+
617
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
618
+
619
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
620
+
621
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
622
+
585
623
  ## dataplex.AssetIamPolicy
586
624
 
587
625
  ```python
@@ -401,6 +401,25 @@ class AssetIamMember(pulumi.CustomResource):
401
401
  member="user:jane@example.com")
402
402
  ```
403
403
 
404
+ ## This resource supports User Project Overrides.
405
+
406
+ -
407
+
408
+ # IAM policy for Dataplex Asset
409
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
410
+
411
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
412
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
413
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
414
+
415
+ A data source can be used to retrieve policy data in advent you do not need creation
416
+
417
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
418
+
419
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
420
+
421
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
422
+
404
423
  ## dataplex.AssetIamPolicy
405
424
 
406
425
  ```python
@@ -582,6 +601,25 @@ class AssetIamMember(pulumi.CustomResource):
582
601
  member="user:jane@example.com")
583
602
  ```
584
603
 
604
+ ## This resource supports User Project Overrides.
605
+
606
+ -
607
+
608
+ # IAM policy for Dataplex Asset
609
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
610
+
611
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
612
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
613
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
614
+
615
+ A data source can be used to retrieve policy data in advent you do not need creation
616
+
617
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
618
+
619
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
620
+
621
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
622
+
585
623
  ## dataplex.AssetIamPolicy
586
624
 
587
625
  ```python