pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -280,6 +280,26 @@ class ServiceIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Service
289
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
292
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
293
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
298
+
299
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_service\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class ServiceIamMember(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Service
462
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
465
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
466
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
471
+
472
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_service\\_iam\\_policy
437
477
 
438
478
  ```python
@@ -177,6 +177,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
+
182
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
+ ---
184
+
185
+ # IAM policy for Service Directory Service
186
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
187
+
188
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
189
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
190
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
191
+
192
+ A data source can be used to retrieve policy data in advent you do not need creation
193
+
194
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
195
+
196
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
197
+
198
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
199
+
180
200
  ## google\\_service\\_directory\\_service\\_iam\\_policy
181
201
 
182
202
  ```python
@@ -318,6 +338,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
318
338
  member="user:jane@example.com")
319
339
  ```
320
340
 
341
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
342
+
343
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
344
+ ---
345
+
346
+ # IAM policy for Service Directory Service
347
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
348
+
349
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
350
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
351
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
352
+
353
+ A data source can be used to retrieve policy data in advent you do not need creation
354
+
355
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
356
+
357
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
358
+
359
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
360
+
321
361
  ## google\\_service\\_directory\\_service\\_iam\\_policy
322
362
 
323
363
  ```python
@@ -319,6 +319,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Source Repositories Repository
327
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
328
+
329
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
330
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
331
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
336
+
337
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## sourcerepo.RepositoryIamPolicy
323
342
 
324
343
  ```python
@@ -478,6 +497,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
478
497
  member="user:jane@example.com")
479
498
  ```
480
499
 
500
+ ## This resource supports User Project Overrides.
501
+
502
+ -
503
+
504
+ # IAM policy for Cloud Source Repositories Repository
505
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
506
+
507
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
508
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
509
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
510
+
511
+ A data source can be used to retrieve policy data in advent you do not need creation
512
+
513
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
514
+
515
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
516
+
517
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
518
+
481
519
  ## sourcerepo.RepositoryIamPolicy
482
520
 
483
521
  ```python
@@ -319,6 +319,25 @@ class RepositoryIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Source Repositories Repository
327
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
328
+
329
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
330
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
331
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
336
+
337
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## sourcerepo.RepositoryIamPolicy
323
342
 
324
343
  ```python
@@ -478,6 +497,25 @@ class RepositoryIamMember(pulumi.CustomResource):
478
497
  member="user:jane@example.com")
479
498
  ```
480
499
 
500
+ ## This resource supports User Project Overrides.
501
+
502
+ -
503
+
504
+ # IAM policy for Cloud Source Repositories Repository
505
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
506
+
507
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
508
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
509
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
510
+
511
+ A data source can be used to retrieve policy data in advent you do not need creation
512
+
513
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
514
+
515
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
516
+
517
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
518
+
481
519
  ## sourcerepo.RepositoryIamPolicy
482
520
 
483
521
  ```python
@@ -216,6 +216,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
+ ## This resource supports User Project Overrides.
220
+
221
+ -
222
+
223
+ # IAM policy for Cloud Source Repositories Repository
224
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
225
+
226
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
227
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
228
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
229
+
230
+ A data source can be used to retrieve policy data in advent you do not need creation
231
+
232
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
233
+
234
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
235
+
236
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
237
+
219
238
  ## sourcerepo.RepositoryIamPolicy
220
239
 
221
240
  ```python
@@ -363,6 +382,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
363
382
  member="user:jane@example.com")
364
383
  ```
365
384
 
385
+ ## This resource supports User Project Overrides.
386
+
387
+ -
388
+
389
+ # IAM policy for Cloud Source Repositories Repository
390
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
391
+
392
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
393
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
394
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
395
+
396
+ A data source can be used to retrieve policy data in advent you do not need creation
397
+
398
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
399
+
400
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
401
+
402
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
403
+
366
404
  ## sourcerepo.RepositoryIamPolicy
367
405
 
368
406
  ```python
@@ -407,43 +407,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
407
407
  })
408
408
  ```
409
409
 
410
- ## spanner.DatabaseIAMPolicy
411
-
412
- ```python
413
- import pulumi
414
- import pulumi_gcp as gcp
415
-
416
- admin = gcp.organizations.get_iam_policy(bindings=[{
417
- "role": "roles/editor",
418
- "members": ["user:jane@example.com"],
419
- }])
420
- database = gcp.spanner.DatabaseIAMPolicy("database",
421
- instance="your-instance-name",
422
- database="your-database-name",
423
- policy_data=admin.policy_data)
424
- ```
425
-
426
- With IAM Conditions:
427
-
428
- ```python
429
- import pulumi
430
- import pulumi_gcp as gcp
431
-
432
- admin = gcp.organizations.get_iam_policy(bindings=[{
433
- "role": "roles/editor",
434
- "members": ["user:jane@example.com"],
435
- "condition": {
436
- "title": "My Role",
437
- "description": "Grant permissions on my_role",
438
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
439
- },
440
- }])
441
- database = gcp.spanner.DatabaseIAMPolicy("database",
442
- instance="your-instance-name",
443
- database="your-database-name",
444
- policy_data=admin.policy_data)
445
- ```
446
-
447
410
  ## spanner.DatabaseIAMBinding
448
411
 
449
412
  ```python
@@ -671,43 +634,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
671
634
  })
672
635
  ```
673
636
 
674
- ## spanner.DatabaseIAMPolicy
675
-
676
- ```python
677
- import pulumi
678
- import pulumi_gcp as gcp
679
-
680
- admin = gcp.organizations.get_iam_policy(bindings=[{
681
- "role": "roles/editor",
682
- "members": ["user:jane@example.com"],
683
- }])
684
- database = gcp.spanner.DatabaseIAMPolicy("database",
685
- instance="your-instance-name",
686
- database="your-database-name",
687
- policy_data=admin.policy_data)
688
- ```
689
-
690
- With IAM Conditions:
691
-
692
- ```python
693
- import pulumi
694
- import pulumi_gcp as gcp
695
-
696
- admin = gcp.organizations.get_iam_policy(bindings=[{
697
- "role": "roles/editor",
698
- "members": ["user:jane@example.com"],
699
- "condition": {
700
- "title": "My Role",
701
- "description": "Grant permissions on my_role",
702
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
703
- },
704
- }])
705
- database = gcp.spanner.DatabaseIAMPolicy("database",
706
- instance="your-instance-name",
707
- database="your-database-name",
708
- policy_data=admin.policy_data)
709
- ```
710
-
711
637
  ## spanner.DatabaseIAMBinding
712
638
 
713
639
  ```python
@@ -407,43 +407,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
407
407
  })
408
408
  ```
409
409
 
410
- ## spanner.DatabaseIAMPolicy
411
-
412
- ```python
413
- import pulumi
414
- import pulumi_gcp as gcp
415
-
416
- admin = gcp.organizations.get_iam_policy(bindings=[{
417
- "role": "roles/editor",
418
- "members": ["user:jane@example.com"],
419
- }])
420
- database = gcp.spanner.DatabaseIAMPolicy("database",
421
- instance="your-instance-name",
422
- database="your-database-name",
423
- policy_data=admin.policy_data)
424
- ```
425
-
426
- With IAM Conditions:
427
-
428
- ```python
429
- import pulumi
430
- import pulumi_gcp as gcp
431
-
432
- admin = gcp.organizations.get_iam_policy(bindings=[{
433
- "role": "roles/editor",
434
- "members": ["user:jane@example.com"],
435
- "condition": {
436
- "title": "My Role",
437
- "description": "Grant permissions on my_role",
438
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
439
- },
440
- }])
441
- database = gcp.spanner.DatabaseIAMPolicy("database",
442
- instance="your-instance-name",
443
- database="your-database-name",
444
- policy_data=admin.policy_data)
445
- ```
446
-
447
410
  ## spanner.DatabaseIAMBinding
448
411
 
449
412
  ```python
@@ -671,43 +634,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
671
634
  })
672
635
  ```
673
636
 
674
- ## spanner.DatabaseIAMPolicy
675
-
676
- ```python
677
- import pulumi
678
- import pulumi_gcp as gcp
679
-
680
- admin = gcp.organizations.get_iam_policy(bindings=[{
681
- "role": "roles/editor",
682
- "members": ["user:jane@example.com"],
683
- }])
684
- database = gcp.spanner.DatabaseIAMPolicy("database",
685
- instance="your-instance-name",
686
- database="your-database-name",
687
- policy_data=admin.policy_data)
688
- ```
689
-
690
- With IAM Conditions:
691
-
692
- ```python
693
- import pulumi
694
- import pulumi_gcp as gcp
695
-
696
- admin = gcp.organizations.get_iam_policy(bindings=[{
697
- "role": "roles/editor",
698
- "members": ["user:jane@example.com"],
699
- "condition": {
700
- "title": "My Role",
701
- "description": "Grant permissions on my_role",
702
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
703
- },
704
- }])
705
- database = gcp.spanner.DatabaseIAMPolicy("database",
706
- instance="your-instance-name",
707
- database="your-database-name",
708
- policy_data=admin.policy_data)
709
- ```
710
-
711
637
  ## spanner.DatabaseIAMBinding
712
638
 
713
639
  ```python
@@ -304,43 +304,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
304
304
  })
305
305
  ```
306
306
 
307
- ## spanner.DatabaseIAMPolicy
308
-
309
- ```python
310
- import pulumi
311
- import pulumi_gcp as gcp
312
-
313
- admin = gcp.organizations.get_iam_policy(bindings=[{
314
- "role": "roles/editor",
315
- "members": ["user:jane@example.com"],
316
- }])
317
- database = gcp.spanner.DatabaseIAMPolicy("database",
318
- instance="your-instance-name",
319
- database="your-database-name",
320
- policy_data=admin.policy_data)
321
- ```
322
-
323
- With IAM Conditions:
324
-
325
- ```python
326
- import pulumi
327
- import pulumi_gcp as gcp
328
-
329
- admin = gcp.organizations.get_iam_policy(bindings=[{
330
- "role": "roles/editor",
331
- "members": ["user:jane@example.com"],
332
- "condition": {
333
- "title": "My Role",
334
- "description": "Grant permissions on my_role",
335
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
336
- },
337
- }])
338
- database = gcp.spanner.DatabaseIAMPolicy("database",
339
- instance="your-instance-name",
340
- database="your-database-name",
341
- policy_data=admin.policy_data)
342
- ```
343
-
344
307
  ## spanner.DatabaseIAMBinding
345
308
 
346
309
  ```python
@@ -557,43 +520,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
557
520
  })
558
521
  ```
559
522
 
560
- ## spanner.DatabaseIAMPolicy
561
-
562
- ```python
563
- import pulumi
564
- import pulumi_gcp as gcp
565
-
566
- admin = gcp.organizations.get_iam_policy(bindings=[{
567
- "role": "roles/editor",
568
- "members": ["user:jane@example.com"],
569
- }])
570
- database = gcp.spanner.DatabaseIAMPolicy("database",
571
- instance="your-instance-name",
572
- database="your-database-name",
573
- policy_data=admin.policy_data)
574
- ```
575
-
576
- With IAM Conditions:
577
-
578
- ```python
579
- import pulumi
580
- import pulumi_gcp as gcp
581
-
582
- admin = gcp.organizations.get_iam_policy(bindings=[{
583
- "role": "roles/editor",
584
- "members": ["user:jane@example.com"],
585
- "condition": {
586
- "title": "My Role",
587
- "description": "Grant permissions on my_role",
588
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
589
- },
590
- }])
591
- database = gcp.spanner.DatabaseIAMPolicy("database",
592
- instance="your-instance-name",
593
- database="your-database-name",
594
- policy_data=admin.policy_data)
595
- ```
596
-
597
523
  ## spanner.DatabaseIAMBinding
598
524
 
599
525
  ```python
@@ -303,21 +303,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
303
303
  member="user:jane@example.com")
304
304
  ```
305
305
 
306
- ## spanner.InstanceIAMPolicy
307
-
308
- ```python
309
- import pulumi
310
- import pulumi_gcp as gcp
311
-
312
- admin = gcp.organizations.get_iam_policy(bindings=[{
313
- "role": "roles/editor",
314
- "members": ["user:jane@example.com"],
315
- }])
316
- instance = gcp.spanner.InstanceIAMPolicy("instance",
317
- instance="your-instance-name",
318
- policy_data=admin.policy_data)
319
- ```
320
-
321
306
  ## spanner.InstanceIAMBinding
322
307
 
323
308
  ```python
@@ -444,21 +429,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
444
429
  member="user:jane@example.com")
445
430
  ```
446
431
 
447
- ## spanner.InstanceIAMPolicy
448
-
449
- ```python
450
- import pulumi
451
- import pulumi_gcp as gcp
452
-
453
- admin = gcp.organizations.get_iam_policy(bindings=[{
454
- "role": "roles/editor",
455
- "members": ["user:jane@example.com"],
456
- }])
457
- instance = gcp.spanner.InstanceIAMPolicy("instance",
458
- instance="your-instance-name",
459
- policy_data=admin.policy_data)
460
- ```
461
-
462
432
  ## spanner.InstanceIAMBinding
463
433
 
464
434
  ```python
@@ -303,21 +303,6 @@ class InstanceIAMMember(pulumi.CustomResource):
303
303
  member="user:jane@example.com")
304
304
  ```
305
305
 
306
- ## spanner.InstanceIAMPolicy
307
-
308
- ```python
309
- import pulumi
310
- import pulumi_gcp as gcp
311
-
312
- admin = gcp.organizations.get_iam_policy(bindings=[{
313
- "role": "roles/editor",
314
- "members": ["user:jane@example.com"],
315
- }])
316
- instance = gcp.spanner.InstanceIAMPolicy("instance",
317
- instance="your-instance-name",
318
- policy_data=admin.policy_data)
319
- ```
320
-
321
306
  ## spanner.InstanceIAMBinding
322
307
 
323
308
  ```python
@@ -444,21 +429,6 @@ class InstanceIAMMember(pulumi.CustomResource):
444
429
  member="user:jane@example.com")
445
430
  ```
446
431
 
447
- ## spanner.InstanceIAMPolicy
448
-
449
- ```python
450
- import pulumi
451
- import pulumi_gcp as gcp
452
-
453
- admin = gcp.organizations.get_iam_policy(bindings=[{
454
- "role": "roles/editor",
455
- "members": ["user:jane@example.com"],
456
- }])
457
- instance = gcp.spanner.InstanceIAMPolicy("instance",
458
- instance="your-instance-name",
459
- policy_data=admin.policy_data)
460
- ```
461
-
462
432
  ## spanner.InstanceIAMBinding
463
433
 
464
434
  ```python
@@ -212,21 +212,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
212
212
  member="user:jane@example.com")
213
213
  ```
214
214
 
215
- ## spanner.InstanceIAMPolicy
216
-
217
- ```python
218
- import pulumi
219
- import pulumi_gcp as gcp
220
-
221
- admin = gcp.organizations.get_iam_policy(bindings=[{
222
- "role": "roles/editor",
223
- "members": ["user:jane@example.com"],
224
- }])
225
- instance = gcp.spanner.InstanceIAMPolicy("instance",
226
- instance="your-instance-name",
227
- policy_data=admin.policy_data)
228
- ```
229
-
230
215
  ## spanner.InstanceIAMBinding
231
216
 
232
217
  ```python
@@ -344,21 +329,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
344
329
  member="user:jane@example.com")
345
330
  ```
346
331
 
347
- ## spanner.InstanceIAMPolicy
348
-
349
- ```python
350
- import pulumi
351
- import pulumi_gcp as gcp
352
-
353
- admin = gcp.organizations.get_iam_policy(bindings=[{
354
- "role": "roles/editor",
355
- "members": ["user:jane@example.com"],
356
- }])
357
- instance = gcp.spanner.InstanceIAMPolicy("instance",
358
- instance="your-instance-name",
359
- policy_data=admin.policy_data)
360
- ```
361
-
362
332
  ## spanner.InstanceIAMBinding
363
333
 
364
334
  ```python