pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -380,6 +380,27 @@ class SecretIamBinding(pulumi.CustomResource):
380
380
  })
381
381
  ```
382
382
 
383
+ ## This resource supports User Project Overrides.
384
+
385
+ -
386
+
387
+ # IAM policy for Secret Manager Secret
388
+ Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
389
+
390
+ * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
391
+ * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
392
+ * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
393
+
394
+ A data source can be used to retrieve policy data in advent you do not need creation
395
+
396
+ * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
397
+
398
+ > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
399
+
400
+ > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
401
+
402
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
403
+
383
404
  ## secretmanager.SecretIamPolicy
384
405
 
385
406
  ```python
@@ -654,6 +675,27 @@ class SecretIamBinding(pulumi.CustomResource):
654
675
  })
655
676
  ```
656
677
 
678
+ ## This resource supports User Project Overrides.
679
+
680
+ -
681
+
682
+ # IAM policy for Secret Manager Secret
683
+ Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
684
+
685
+ * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
686
+ * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
687
+ * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
688
+
689
+ A data source can be used to retrieve policy data in advent you do not need creation
690
+
691
+ * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
692
+
693
+ > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
694
+
695
+ > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
696
+
697
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
698
+
657
699
  ## secretmanager.SecretIamPolicy
658
700
 
659
701
  ```python
@@ -380,6 +380,27 @@ class SecretIamMember(pulumi.CustomResource):
380
380
  })
381
381
  ```
382
382
 
383
+ ## This resource supports User Project Overrides.
384
+
385
+ -
386
+
387
+ # IAM policy for Secret Manager Secret
388
+ Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
389
+
390
+ * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
391
+ * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
392
+ * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
393
+
394
+ A data source can be used to retrieve policy data in advent you do not need creation
395
+
396
+ * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
397
+
398
+ > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
399
+
400
+ > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
401
+
402
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
403
+
383
404
  ## secretmanager.SecretIamPolicy
384
405
 
385
406
  ```python
@@ -654,6 +675,27 @@ class SecretIamMember(pulumi.CustomResource):
654
675
  })
655
676
  ```
656
677
 
678
+ ## This resource supports User Project Overrides.
679
+
680
+ -
681
+
682
+ # IAM policy for Secret Manager Secret
683
+ Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
684
+
685
+ * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
686
+ * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
687
+ * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
688
+
689
+ A data source can be used to retrieve policy data in advent you do not need creation
690
+
691
+ * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
692
+
693
+ > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
694
+
695
+ > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
696
+
697
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
698
+
657
699
  ## secretmanager.SecretIamPolicy
658
700
 
659
701
  ```python
@@ -265,6 +265,27 @@ class SecretIamPolicy(pulumi.CustomResource):
265
265
  })
266
266
  ```
267
267
 
268
+ ## This resource supports User Project Overrides.
269
+
270
+ -
271
+
272
+ # IAM policy for Secret Manager Secret
273
+ Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
274
+
275
+ * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
276
+ * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
277
+ * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
278
+
279
+ A data source can be used to retrieve policy data in advent you do not need creation
280
+
281
+ * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
282
+
283
+ > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
284
+
285
+ > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
286
+
287
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
288
+
268
289
  ## secretmanager.SecretIamPolicy
269
290
 
270
291
  ```python
@@ -525,6 +546,27 @@ class SecretIamPolicy(pulumi.CustomResource):
525
546
  })
526
547
  ```
527
548
 
549
+ ## This resource supports User Project Overrides.
550
+
551
+ -
552
+
553
+ # IAM policy for Secret Manager Secret
554
+ Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
555
+
556
+ * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
557
+ * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
558
+ * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
559
+
560
+ A data source can be used to retrieve policy data in advent you do not need creation
561
+
562
+ * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
563
+
564
+ > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
565
+
566
+ > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
567
+
568
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
569
+
528
570
  ## secretmanager.SecretIamPolicy
529
571
 
530
572
  ```python
@@ -371,6 +371,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
371
371
  member="user:jane@example.com")
372
372
  ```
373
373
 
374
+ ## This resource supports User Project Overrides.
375
+
376
+ -
377
+
378
+ # IAM policy for Secure Source Manager Repository
379
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
380
+
381
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
382
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
383
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
384
+
385
+ A data source can be used to retrieve policy data in advent you do not need creation
386
+
387
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
388
+
389
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
390
+
391
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
392
+
374
393
  ## securesourcemanager.RepositoryIamPolicy
375
394
 
376
395
  ```python
@@ -545,6 +564,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
545
564
  member="user:jane@example.com")
546
565
  ```
547
566
 
567
+ ## This resource supports User Project Overrides.
568
+
569
+ -
570
+
571
+ # IAM policy for Secure Source Manager Repository
572
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
573
+
574
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
575
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
576
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
577
+
578
+ A data source can be used to retrieve policy data in advent you do not need creation
579
+
580
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
581
+
582
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
583
+
584
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
585
+
548
586
  ## securesourcemanager.RepositoryIamPolicy
549
587
 
550
588
  ```python
@@ -371,6 +371,25 @@ class RepositoryIamMember(pulumi.CustomResource):
371
371
  member="user:jane@example.com")
372
372
  ```
373
373
 
374
+ ## This resource supports User Project Overrides.
375
+
376
+ -
377
+
378
+ # IAM policy for Secure Source Manager Repository
379
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
380
+
381
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
382
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
383
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
384
+
385
+ A data source can be used to retrieve policy data in advent you do not need creation
386
+
387
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
388
+
389
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
390
+
391
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
392
+
374
393
  ## securesourcemanager.RepositoryIamPolicy
375
394
 
376
395
  ```python
@@ -545,6 +564,25 @@ class RepositoryIamMember(pulumi.CustomResource):
545
564
  member="user:jane@example.com")
546
565
  ```
547
566
 
567
+ ## This resource supports User Project Overrides.
568
+
569
+ -
570
+
571
+ # IAM policy for Secure Source Manager Repository
572
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
573
+
574
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
575
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
576
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
577
+
578
+ A data source can be used to retrieve policy data in advent you do not need creation
579
+
580
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
581
+
582
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
583
+
584
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
585
+
548
586
  ## securesourcemanager.RepositoryIamPolicy
549
587
 
550
588
  ```python
@@ -268,6 +268,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
268
268
  member="user:jane@example.com")
269
269
  ```
270
270
 
271
+ ## This resource supports User Project Overrides.
272
+
273
+ -
274
+
275
+ # IAM policy for Secure Source Manager Repository
276
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
277
+
278
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
279
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
280
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
281
+
282
+ A data source can be used to retrieve policy data in advent you do not need creation
283
+
284
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
285
+
286
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
287
+
288
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
289
+
271
290
  ## securesourcemanager.RepositoryIamPolicy
272
291
 
273
292
  ```python
@@ -430,6 +449,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
430
449
  member="user:jane@example.com")
431
450
  ```
432
451
 
452
+ ## This resource supports User Project Overrides.
453
+
454
+ -
455
+
456
+ # IAM policy for Secure Source Manager Repository
457
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
458
+
459
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
460
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
461
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
462
+
463
+ A data source can be used to retrieve policy data in advent you do not need creation
464
+
465
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
466
+
467
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
468
+
469
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
470
+
433
471
  ## securesourcemanager.RepositoryIamPolicy
434
472
 
435
473
  ```python
@@ -155,9 +155,9 @@ def get_account(account_id: Optional[str] = None,
155
155
  myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
156
156
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
157
157
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
158
- metadata=kubernetes.meta.v1.ObjectMetaArgs(
159
- name="google-application-credentials",
160
- ),
158
+ metadata={
159
+ "name": "google-application-credentials",
160
+ },
161
161
  data={
162
162
  "json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
163
163
  })
@@ -220,9 +220,9 @@ def get_account_output(account_id: Optional[pulumi.Input[str]] = None,
220
220
  myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
221
221
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
222
222
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
223
- metadata=kubernetes.meta.v1.ObjectMetaArgs(
224
- name="google-application-credentials",
225
- ),
223
+ metadata={
224
+ "name": "google-application-credentials",
225
+ },
226
226
  data={
227
227
  "json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
228
228
  })
@@ -402,9 +402,9 @@ class Key(pulumi.CustomResource):
402
402
  display_name="My Service Account")
403
403
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
404
404
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
405
- metadata=kubernetes.meta.v1.ObjectMetaArgs(
406
- name="google-application-credentials",
407
- ),
405
+ metadata={
406
+ "name": "google-application-credentials",
407
+ },
408
408
  data={
409
409
  "credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
410
410
  })
@@ -488,9 +488,9 @@ class Key(pulumi.CustomResource):
488
488
  display_name="My Service Account")
489
489
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
490
490
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
491
- metadata=kubernetes.meta.v1.ObjectMetaArgs(
492
- name="google-application-credentials",
493
- ),
491
+ metadata={
492
+ "name": "google-application-credentials",
493
+ },
494
494
  data={
495
495
  "credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
496
496
  })
@@ -280,6 +280,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Namespace
289
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
292
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
293
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
298
+
299
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Namespace
462
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
465
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
466
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
471
+
472
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
437
477
 
438
478
  ```python
@@ -280,6 +280,26 @@ class NamespaceIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Namespace
289
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
292
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
293
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
298
+
299
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class NamespaceIamMember(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Namespace
462
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
465
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
466
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
471
+
472
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
437
477
 
438
478
  ```python
@@ -177,6 +177,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
+
182
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
+ ---
184
+
185
+ # IAM policy for Service Directory Namespace
186
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
187
+
188
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
189
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
190
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
191
+
192
+ A data source can be used to retrieve policy data in advent you do not need creation
193
+
194
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
195
+
196
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
197
+
198
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
199
+
180
200
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
181
201
 
182
202
  ```python
@@ -318,6 +338,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
318
338
  member="user:jane@example.com")
319
339
  ```
320
340
 
341
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
342
+
343
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
344
+ ---
345
+
346
+ # IAM policy for Service Directory Namespace
347
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
348
+
349
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
350
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
351
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
352
+
353
+ A data source can be used to retrieve policy data in advent you do not need creation
354
+
355
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
356
+
357
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
358
+
359
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
360
+
321
361
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
322
362
 
323
363
  ```python
@@ -280,6 +280,26 @@ class ServiceIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Service
289
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
292
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
293
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
298
+
299
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_service\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class ServiceIamBinding(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Service
462
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
465
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
466
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
471
+
472
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_service\\_iam\\_policy
437
477
 
438
478
  ```python