pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -285,53 +285,6 @@ class IAMPolicy(pulumi.CustomResource):
285
285
  ])
286
286
  ```
287
287
 
288
- ## organizations.IAMPolicy
289
-
290
- !> **Warning:** New organizations have several default policies which will,
291
- without extreme caution, be **overwritten** by use of this resource.
292
- The safest alternative is to use multiple `organizations.IAMBinding`
293
- resources. This resource makes it easy to remove your own access to
294
- an organization, which will require a call to Google Support to have
295
- fixed, and can take multiple days to resolve.
296
-
297
- In general, this resource should only be used with organizations
298
- fully managed by this provider.I f you do use this resource,
299
- the best way to be sure that you are not making dangerous changes is to start
300
- by **importing** your existing policy, and examining the diff very closely.
301
-
302
- ```python
303
- import pulumi
304
- import pulumi_gcp as gcp
305
-
306
- admin = gcp.organizations.get_iam_policy(bindings=[{
307
- "role": "roles/editor",
308
- "members": ["user:jane@example.com"],
309
- }])
310
- organization = gcp.organizations.IAMPolicy("organization",
311
- org_id="1234567890",
312
- policy_data=admin.policy_data)
313
- ```
314
-
315
- With IAM Conditions:
316
-
317
- ```python
318
- import pulumi
319
- import pulumi_gcp as gcp
320
-
321
- admin = gcp.organizations.get_iam_policy(bindings=[{
322
- "role": "roles/editor",
323
- "members": ["user:jane@example.com"],
324
- "condition": {
325
- "title": "expires_after_2019_12_31",
326
- "description": "Expiring at midnight of 2019-12-31",
327
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
328
- },
329
- }])
330
- organization = gcp.organizations.IAMPolicy("organization",
331
- org_id="1234567890",
332
- policy_data=admin.policy_data)
333
- ```
334
-
335
288
  ## organizations.IAMBinding
336
289
 
337
290
  > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
@@ -595,53 +548,6 @@ class IAMPolicy(pulumi.CustomResource):
595
548
  ])
596
549
  ```
597
550
 
598
- ## organizations.IAMPolicy
599
-
600
- !> **Warning:** New organizations have several default policies which will,
601
- without extreme caution, be **overwritten** by use of this resource.
602
- The safest alternative is to use multiple `organizations.IAMBinding`
603
- resources. This resource makes it easy to remove your own access to
604
- an organization, which will require a call to Google Support to have
605
- fixed, and can take multiple days to resolve.
606
-
607
- In general, this resource should only be used with organizations
608
- fully managed by this provider.I f you do use this resource,
609
- the best way to be sure that you are not making dangerous changes is to start
610
- by **importing** your existing policy, and examining the diff very closely.
611
-
612
- ```python
613
- import pulumi
614
- import pulumi_gcp as gcp
615
-
616
- admin = gcp.organizations.get_iam_policy(bindings=[{
617
- "role": "roles/editor",
618
- "members": ["user:jane@example.com"],
619
- }])
620
- organization = gcp.organizations.IAMPolicy("organization",
621
- org_id="1234567890",
622
- policy_data=admin.policy_data)
623
- ```
624
-
625
- With IAM Conditions:
626
-
627
- ```python
628
- import pulumi
629
- import pulumi_gcp as gcp
630
-
631
- admin = gcp.organizations.get_iam_policy(bindings=[{
632
- "role": "roles/editor",
633
- "members": ["user:jane@example.com"],
634
- "condition": {
635
- "title": "expires_after_2019_12_31",
636
- "description": "Expiring at midnight of 2019-12-31",
637
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
638
- },
639
- }])
640
- organization = gcp.organizations.IAMPolicy("organization",
641
- org_id="1234567890",
642
- policy_data=admin.policy_data)
643
- ```
644
-
645
551
  ## organizations.IAMBinding
646
552
 
647
553
  > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
@@ -54,7 +54,7 @@ class ProjectArgs:
54
54
  organization.
55
55
  :param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
56
56
  :param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
57
- without deleting the Project via the Google API.
57
+ without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
58
58
  """
59
59
  if auto_create_network is not None:
60
60
  pulumi.set(__self__, "auto_create_network", auto_create_network)
@@ -70,6 +70,9 @@ class ProjectArgs:
70
70
  pulumi.set(__self__, "org_id", org_id)
71
71
  if project_id is not None:
72
72
  pulumi.set(__self__, "project_id", project_id)
73
+ if skip_delete is not None:
74
+ warnings.warn("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""", DeprecationWarning)
75
+ pulumi.log.warn("""skip_delete is deprecated: skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
73
76
  if skip_delete is not None:
74
77
  pulumi.set(__self__, "skip_delete", skip_delete)
75
78
 
@@ -176,10 +179,11 @@ class ProjectArgs:
176
179
 
177
180
  @property
178
181
  @pulumi.getter(name="skipDelete")
182
+ @_utilities.deprecated("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
179
183
  def skip_delete(self) -> Optional[pulumi.Input[bool]]:
180
184
  """
181
185
  If true, the resource can be deleted
182
- without deleting the Project via the Google API.
186
+ without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
183
187
  """
184
188
  return pulumi.get(self, "skip_delete")
185
189
 
@@ -232,7 +236,7 @@ class _ProjectState:
232
236
  :param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
233
237
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] pulumi_labels: The combination of labels configured directly on the resource and default labels configured on the provider.
234
238
  :param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
235
- without deleting the Project via the Google API.
239
+ without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
236
240
  """
237
241
  if auto_create_network is not None:
238
242
  pulumi.set(__self__, "auto_create_network", auto_create_network)
@@ -254,6 +258,9 @@ class _ProjectState:
254
258
  pulumi.set(__self__, "project_id", project_id)
255
259
  if pulumi_labels is not None:
256
260
  pulumi.set(__self__, "pulumi_labels", pulumi_labels)
261
+ if skip_delete is not None:
262
+ warnings.warn("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""", DeprecationWarning)
263
+ pulumi.log.warn("""skip_delete is deprecated: skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
257
264
  if skip_delete is not None:
258
265
  pulumi.set(__self__, "skip_delete", skip_delete)
259
266
 
@@ -396,10 +403,11 @@ class _ProjectState:
396
403
 
397
404
  @property
398
405
  @pulumi.getter(name="skipDelete")
406
+ @_utilities.deprecated("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
399
407
  def skip_delete(self) -> Optional[pulumi.Input[bool]]:
400
408
  """
401
409
  If true, the resource can be deleted
402
- without deleting the Project via the Google API.
410
+ without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
403
411
  """
404
412
  return pulumi.get(self, "skip_delete")
405
413
 
@@ -507,7 +515,7 @@ class Project(pulumi.CustomResource):
507
515
  organization.
508
516
  :param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
509
517
  :param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
510
- without deleting the Project via the Google API.
518
+ without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
511
519
  """
512
520
  ...
513
521
  @overload
@@ -674,7 +682,7 @@ class Project(pulumi.CustomResource):
674
682
  :param pulumi.Input[str] project_id: The project ID. Changing this forces a new project to be created.
675
683
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] pulumi_labels: The combination of labels configured directly on the resource and default labels configured on the provider.
676
684
  :param pulumi.Input[bool] skip_delete: If true, the resource can be deleted
677
- without deleting the Project via the Google API.
685
+ without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
678
686
  """
679
687
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
680
688
 
@@ -792,10 +800,11 @@ class Project(pulumi.CustomResource):
792
800
 
793
801
  @property
794
802
  @pulumi.getter(name="skipDelete")
803
+ @_utilities.deprecated("""skip_delete is deprecated and will be removed in a future major release. The new release adds support for deletion_policy instead.""")
795
804
  def skip_delete(self) -> pulumi.Output[bool]:
796
805
  """
797
806
  If true, the resource can be deleted
798
- without deleting the Project via the Google API.
807
+ without deleting the Project via the Google API. `skip_delete` is deprecated and will be removed in a future major release. The new release adds support for `deletion_policy` instead.
799
808
  """
800
809
  return pulumi.get(self, "skip_delete")
801
810
 
@@ -319,6 +319,25 @@ class SchemaIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Pub/Sub Schema
327
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
328
+
329
+ * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
330
+ * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
331
+ * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
336
+
337
+ > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## pubsub.SchemaIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class SchemaIamBinding(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Cloud Pub/Sub Schema
507
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
508
+
509
+ * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
510
+ * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
511
+ * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
516
+
517
+ > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## pubsub.SchemaIamPolicy
484
522
 
485
523
  ```python
@@ -319,6 +319,25 @@ class SchemaIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Pub/Sub Schema
327
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
328
+
329
+ * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
330
+ * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
331
+ * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
336
+
337
+ > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## pubsub.SchemaIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class SchemaIamMember(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Cloud Pub/Sub Schema
507
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
508
+
509
+ * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
510
+ * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
511
+ * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
516
+
517
+ > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## pubsub.SchemaIamPolicy
484
522
 
485
523
  ```python
@@ -216,6 +216,25 @@ class SchemaIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
+ ## This resource supports User Project Overrides.
220
+
221
+ -
222
+
223
+ # IAM policy for Cloud Pub/Sub Schema
224
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
225
+
226
+ * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
227
+ * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
228
+ * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
229
+
230
+ A data source can be used to retrieve policy data in advent you do not need creation
231
+
232
+ * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
233
+
234
+ > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
235
+
236
+ > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
237
+
219
238
  ## pubsub.SchemaIamPolicy
220
239
 
221
240
  ```python
@@ -365,6 +384,25 @@ class SchemaIamPolicy(pulumi.CustomResource):
365
384
  member="user:jane@example.com")
366
385
  ```
367
386
 
387
+ ## This resource supports User Project Overrides.
388
+
389
+ -
390
+
391
+ # IAM policy for Cloud Pub/Sub Schema
392
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
393
+
394
+ * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
395
+ * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
396
+ * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
397
+
398
+ A data source can be used to retrieve policy data in advent you do not need creation
399
+
400
+ * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
401
+
402
+ > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
403
+
404
+ > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
405
+
368
406
  ## pubsub.SchemaIamPolicy
369
407
 
370
408
  ```python
@@ -300,21 +300,6 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
300
300
  member="user:jane@example.com")
301
301
  ```
302
302
 
303
- ## pubsub.SubscriptionIAMPolicy
304
-
305
- ```python
306
- import pulumi
307
- import pulumi_gcp as gcp
308
-
309
- admin = gcp.organizations.get_iam_policy(bindings=[{
310
- "role": "roles/editor",
311
- "members": ["user:jane@example.com"],
312
- }])
313
- editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
314
- subscription="your-subscription-name",
315
- policy_data=admin.policy_data)
316
- ```
317
-
318
303
  ## pubsub.SubscriptionIAMBinding
319
304
 
320
305
  ```python
@@ -438,21 +423,6 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
438
423
  member="user:jane@example.com")
439
424
  ```
440
425
 
441
- ## pubsub.SubscriptionIAMPolicy
442
-
443
- ```python
444
- import pulumi
445
- import pulumi_gcp as gcp
446
-
447
- admin = gcp.organizations.get_iam_policy(bindings=[{
448
- "role": "roles/editor",
449
- "members": ["user:jane@example.com"],
450
- }])
451
- editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
452
- subscription="your-subscription-name",
453
- policy_data=admin.policy_data)
454
- ```
455
-
456
426
  ## pubsub.SubscriptionIAMBinding
457
427
 
458
428
  ```python
@@ -300,21 +300,6 @@ class SubscriptionIAMMember(pulumi.CustomResource):
300
300
  member="user:jane@example.com")
301
301
  ```
302
302
 
303
- ## pubsub.SubscriptionIAMPolicy
304
-
305
- ```python
306
- import pulumi
307
- import pulumi_gcp as gcp
308
-
309
- admin = gcp.organizations.get_iam_policy(bindings=[{
310
- "role": "roles/editor",
311
- "members": ["user:jane@example.com"],
312
- }])
313
- editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
314
- subscription="your-subscription-name",
315
- policy_data=admin.policy_data)
316
- ```
317
-
318
303
  ## pubsub.SubscriptionIAMBinding
319
304
 
320
305
  ```python
@@ -438,21 +423,6 @@ class SubscriptionIAMMember(pulumi.CustomResource):
438
423
  member="user:jane@example.com")
439
424
  ```
440
425
 
441
- ## pubsub.SubscriptionIAMPolicy
442
-
443
- ```python
444
- import pulumi
445
- import pulumi_gcp as gcp
446
-
447
- admin = gcp.organizations.get_iam_policy(bindings=[{
448
- "role": "roles/editor",
449
- "members": ["user:jane@example.com"],
450
- }])
451
- editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
452
- subscription="your-subscription-name",
453
- policy_data=admin.policy_data)
454
- ```
455
-
456
426
  ## pubsub.SubscriptionIAMBinding
457
427
 
458
428
  ```python
@@ -217,21 +217,6 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
217
217
  member="user:jane@example.com")
218
218
  ```
219
219
 
220
- ## pubsub.SubscriptionIAMPolicy
221
-
222
- ```python
223
- import pulumi
224
- import pulumi_gcp as gcp
225
-
226
- admin = gcp.organizations.get_iam_policy(bindings=[{
227
- "role": "roles/editor",
228
- "members": ["user:jane@example.com"],
229
- }])
230
- editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
231
- subscription="your-subscription-name",
232
- policy_data=admin.policy_data)
233
- ```
234
-
235
220
  ## pubsub.SubscriptionIAMBinding
236
221
 
237
222
  ```python
@@ -348,21 +333,6 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
348
333
  member="user:jane@example.com")
349
334
  ```
350
335
 
351
- ## pubsub.SubscriptionIAMPolicy
352
-
353
- ```python
354
- import pulumi
355
- import pulumi_gcp as gcp
356
-
357
- admin = gcp.organizations.get_iam_policy(bindings=[{
358
- "role": "roles/editor",
359
- "members": ["user:jane@example.com"],
360
- }])
361
- editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
362
- subscription="your-subscription-name",
363
- policy_data=admin.policy_data)
364
- ```
365
-
366
336
  ## pubsub.SubscriptionIAMBinding
367
337
 
368
338
  ```python
@@ -319,6 +319,25 @@ class TopicIAMBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Pub/Sub Topic
327
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
328
+
329
+ * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
330
+ * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
331
+ * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
336
+
337
+ > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## pubsub.TopicIAMPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class TopicIAMBinding(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Cloud Pub/Sub Topic
507
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
508
+
509
+ * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
510
+ * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
511
+ * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
516
+
517
+ > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## pubsub.TopicIAMPolicy
484
522
 
485
523
  ```python
@@ -319,6 +319,25 @@ class TopicIAMMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Pub/Sub Topic
327
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
328
+
329
+ * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
330
+ * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
331
+ * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
336
+
337
+ > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## pubsub.TopicIAMPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class TopicIAMMember(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Cloud Pub/Sub Topic
507
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
508
+
509
+ * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
510
+ * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
511
+ * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
516
+
517
+ > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## pubsub.TopicIAMPolicy
484
522
 
485
523
  ```python
@@ -216,6 +216,25 @@ class TopicIAMPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
+ ## This resource supports User Project Overrides.
220
+
221
+ -
222
+
223
+ # IAM policy for Cloud Pub/Sub Topic
224
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
225
+
226
+ * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
227
+ * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
228
+ * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
229
+
230
+ A data source can be used to retrieve policy data in advent you do not need creation
231
+
232
+ * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
233
+
234
+ > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
235
+
236
+ > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
237
+
219
238
  ## pubsub.TopicIAMPolicy
220
239
 
221
240
  ```python
@@ -365,6 +384,25 @@ class TopicIAMPolicy(pulumi.CustomResource):
365
384
  member="user:jane@example.com")
366
385
  ```
367
386
 
387
+ ## This resource supports User Project Overrides.
388
+
389
+ -
390
+
391
+ # IAM policy for Cloud Pub/Sub Topic
392
+ Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
393
+
394
+ * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
395
+ * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
396
+ * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
397
+
398
+ A data source can be used to retrieve policy data in advent you do not need creation
399
+
400
+ * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
401
+
402
+ > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
403
+
404
+ > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
405
+
368
406
  ## pubsub.TopicIAMPolicy
369
407
 
370
408
  ```python
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "gcp",
4
- "version": "7.35.0-alpha.1722924350"
4
+ "version": "7.36.0"
5
5
  }