pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -288,6 +288,25 @@ class ConnectionIamPolicy(pulumi.CustomResource):
288
288
  member="user:jane@example.com")
289
289
  ```
290
290
 
291
+ ## This resource supports User Project Overrides.
292
+
293
+ -
294
+
295
+ # IAM policy for BigQuery Connection Connection
296
+ Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
297
+
298
+ * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
299
+ * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
300
+ * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
301
+
302
+ A data source can be used to retrieve policy data in advent you do not need creation
303
+
304
+ * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
305
+
306
+ > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
307
+
308
+ > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
309
+
291
310
  ## bigquery.ConnectionIamPolicy
292
311
 
293
312
  ```python
@@ -455,6 +474,25 @@ class ConnectionIamPolicy(pulumi.CustomResource):
455
474
  member="user:jane@example.com")
456
475
  ```
457
476
 
477
+ ## This resource supports User Project Overrides.
478
+
479
+ -
480
+
481
+ # IAM policy for BigQuery Connection Connection
482
+ Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
483
+
484
+ * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
485
+ * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
486
+ * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
487
+
488
+ A data source can be used to retrieve policy data in advent you do not need creation
489
+
490
+ * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
491
+
492
+ > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
493
+
494
+ > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
495
+
458
496
  ## bigquery.ConnectionIamPolicy
459
497
 
460
498
  ```python
@@ -693,6 +693,32 @@ class DataTransferConfig(pulumi.CustomResource):
693
693
  },
694
694
  opts = pulumi.ResourceOptions(depends_on=[permissions]))
695
695
  ```
696
+ ### Bigquerydatatransfer Config Salesforce
697
+
698
+ ```python
699
+ import pulumi
700
+ import pulumi_gcp as gcp
701
+
702
+ project = gcp.organizations.get_project()
703
+ my_dataset = gcp.bigquery.Dataset("my_dataset",
704
+ dataset_id="my_dataset",
705
+ description="My dataset",
706
+ location="asia-northeast1")
707
+ salesforce_config = gcp.bigquery.DataTransferConfig("salesforce_config",
708
+ display_name="my-salesforce-config",
709
+ location="asia-northeast1",
710
+ data_source_id="salesforce",
711
+ schedule="first sunday of quarter 00:00",
712
+ destination_dataset_id=my_dataset.dataset_id,
713
+ params={
714
+ "connector.authentication.oauth.clientId": "client-id",
715
+ "connector.authentication.oauth.clientSecret": "client-secret",
716
+ "connector.authentication.username": "username",
717
+ "connector.authentication.password": "password",
718
+ "connector.authentication.securityToken": "security-token",
719
+ "assets": "[\\"asset-a\\",\\"asset-b\\"]",
720
+ })
721
+ ```
696
722
 
697
723
  ## Import
698
724
 
@@ -803,6 +829,32 @@ class DataTransferConfig(pulumi.CustomResource):
803
829
  },
804
830
  opts = pulumi.ResourceOptions(depends_on=[permissions]))
805
831
  ```
832
+ ### Bigquerydatatransfer Config Salesforce
833
+
834
+ ```python
835
+ import pulumi
836
+ import pulumi_gcp as gcp
837
+
838
+ project = gcp.organizations.get_project()
839
+ my_dataset = gcp.bigquery.Dataset("my_dataset",
840
+ dataset_id="my_dataset",
841
+ description="My dataset",
842
+ location="asia-northeast1")
843
+ salesforce_config = gcp.bigquery.DataTransferConfig("salesforce_config",
844
+ display_name="my-salesforce-config",
845
+ location="asia-northeast1",
846
+ data_source_id="salesforce",
847
+ schedule="first sunday of quarter 00:00",
848
+ destination_dataset_id=my_dataset.dataset_id,
849
+ params={
850
+ "connector.authentication.oauth.clientId": "client-id",
851
+ "connector.authentication.oauth.clientSecret": "client-secret",
852
+ "connector.authentication.username": "username",
853
+ "connector.authentication.password": "password",
854
+ "connector.authentication.securityToken": "security-token",
855
+ "assets": "[\\"asset-a\\",\\"asset-b\\"]",
856
+ })
857
+ ```
806
858
 
807
859
  ## Import
808
860
 
@@ -315,22 +315,6 @@ class DatasetIamBinding(pulumi.CustomResource):
315
315
  member="user:jane@example.com")
316
316
  ```
317
317
 
318
- ## bigquery.DatasetIamPolicy
319
-
320
- ```python
321
- import pulumi
322
- import pulumi_gcp as gcp
323
-
324
- owner = gcp.organizations.get_iam_policy(bindings=[{
325
- "role": "roles/bigquery.dataOwner",
326
- "members": ["user:jane@example.com"],
327
- }])
328
- dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
329
- dataset = gcp.bigquery.DatasetIamPolicy("dataset",
330
- dataset_id=dataset_dataset.dataset_id,
331
- policy_data=owner.policy_data)
332
- ```
333
-
334
318
  ## bigquery.DatasetIamBinding
335
319
 
336
320
  ```python
@@ -468,22 +452,6 @@ class DatasetIamBinding(pulumi.CustomResource):
468
452
  member="user:jane@example.com")
469
453
  ```
470
454
 
471
- ## bigquery.DatasetIamPolicy
472
-
473
- ```python
474
- import pulumi
475
- import pulumi_gcp as gcp
476
-
477
- owner = gcp.organizations.get_iam_policy(bindings=[{
478
- "role": "roles/bigquery.dataOwner",
479
- "members": ["user:jane@example.com"],
480
- }])
481
- dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
482
- dataset = gcp.bigquery.DatasetIamPolicy("dataset",
483
- dataset_id=dataset_dataset.dataset_id,
484
- policy_data=owner.policy_data)
485
- ```
486
-
487
455
  ## bigquery.DatasetIamBinding
488
456
 
489
457
  ```python
@@ -315,22 +315,6 @@ class DatasetIamMember(pulumi.CustomResource):
315
315
  member="user:jane@example.com")
316
316
  ```
317
317
 
318
- ## bigquery.DatasetIamPolicy
319
-
320
- ```python
321
- import pulumi
322
- import pulumi_gcp as gcp
323
-
324
- owner = gcp.organizations.get_iam_policy(bindings=[{
325
- "role": "roles/bigquery.dataOwner",
326
- "members": ["user:jane@example.com"],
327
- }])
328
- dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
329
- dataset = gcp.bigquery.DatasetIamPolicy("dataset",
330
- dataset_id=dataset_dataset.dataset_id,
331
- policy_data=owner.policy_data)
332
- ```
333
-
334
318
  ## bigquery.DatasetIamBinding
335
319
 
336
320
  ```python
@@ -468,22 +452,6 @@ class DatasetIamMember(pulumi.CustomResource):
468
452
  member="user:jane@example.com")
469
453
  ```
470
454
 
471
- ## bigquery.DatasetIamPolicy
472
-
473
- ```python
474
- import pulumi
475
- import pulumi_gcp as gcp
476
-
477
- owner = gcp.organizations.get_iam_policy(bindings=[{
478
- "role": "roles/bigquery.dataOwner",
479
- "members": ["user:jane@example.com"],
480
- }])
481
- dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
482
- dataset = gcp.bigquery.DatasetIamPolicy("dataset",
483
- dataset_id=dataset_dataset.dataset_id,
484
- policy_data=owner.policy_data)
485
- ```
486
-
487
455
  ## bigquery.DatasetIamBinding
488
456
 
489
457
  ```python
@@ -220,22 +220,6 @@ class DatasetIamPolicy(pulumi.CustomResource):
220
220
  member="user:jane@example.com")
221
221
  ```
222
222
 
223
- ## bigquery.DatasetIamPolicy
224
-
225
- ```python
226
- import pulumi
227
- import pulumi_gcp as gcp
228
-
229
- owner = gcp.organizations.get_iam_policy(bindings=[{
230
- "role": "roles/bigquery.dataOwner",
231
- "members": ["user:jane@example.com"],
232
- }])
233
- dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
234
- dataset = gcp.bigquery.DatasetIamPolicy("dataset",
235
- dataset_id=dataset_dataset.dataset_id,
236
- policy_data=owner.policy_data)
237
- ```
238
-
239
223
  ## bigquery.DatasetIamBinding
240
224
 
241
225
  ```python
@@ -363,22 +347,6 @@ class DatasetIamPolicy(pulumi.CustomResource):
363
347
  member="user:jane@example.com")
364
348
  ```
365
349
 
366
- ## bigquery.DatasetIamPolicy
367
-
368
- ```python
369
- import pulumi
370
- import pulumi_gcp as gcp
371
-
372
- owner = gcp.organizations.get_iam_policy(bindings=[{
373
- "role": "roles/bigquery.dataOwner",
374
- "members": ["user:jane@example.com"],
375
- }])
376
- dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
377
- dataset = gcp.bigquery.DatasetIamPolicy("dataset",
378
- dataset_id=dataset_dataset.dataset_id,
379
- policy_data=owner.policy_data)
380
- ```
381
-
382
350
  ## bigquery.DatasetIamBinding
383
351
 
384
352
  ```python
@@ -410,6 +410,27 @@ class IamBinding(pulumi.CustomResource):
410
410
  })
411
411
  ```
412
412
 
413
+ ## This resource supports User Project Overrides.
414
+
415
+ -
416
+
417
+ # IAM policy for BigQuery Table
418
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
419
+
420
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
421
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
422
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
423
+
424
+ A data source can be used to retrieve policy data in advent you do not need creation
425
+
426
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
427
+
428
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
429
+
430
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
431
+
432
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
433
+
413
434
  ## bigquery.IamPolicy
414
435
 
415
436
  ```python
@@ -698,6 +719,27 @@ class IamBinding(pulumi.CustomResource):
698
719
  })
699
720
  ```
700
721
 
722
+ ## This resource supports User Project Overrides.
723
+
724
+ -
725
+
726
+ # IAM policy for BigQuery Table
727
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
728
+
729
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
730
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
731
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
732
+
733
+ A data source can be used to retrieve policy data in advent you do not need creation
734
+
735
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
736
+
737
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
738
+
739
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
740
+
741
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
742
+
701
743
  ## bigquery.IamPolicy
702
744
 
703
745
  ```python
@@ -410,6 +410,27 @@ class IamMember(pulumi.CustomResource):
410
410
  })
411
411
  ```
412
412
 
413
+ ## This resource supports User Project Overrides.
414
+
415
+ -
416
+
417
+ # IAM policy for BigQuery Table
418
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
419
+
420
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
421
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
422
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
423
+
424
+ A data source can be used to retrieve policy data in advent you do not need creation
425
+
426
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
427
+
428
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
429
+
430
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
431
+
432
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
433
+
413
434
  ## bigquery.IamPolicy
414
435
 
415
436
  ```python
@@ -698,6 +719,27 @@ class IamMember(pulumi.CustomResource):
698
719
  })
699
720
  ```
700
721
 
722
+ ## This resource supports User Project Overrides.
723
+
724
+ -
725
+
726
+ # IAM policy for BigQuery Table
727
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
728
+
729
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
730
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
731
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
732
+
733
+ A data source can be used to retrieve policy data in advent you do not need creation
734
+
735
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
736
+
737
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
738
+
739
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
740
+
741
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
742
+
701
743
  ## bigquery.IamPolicy
702
744
 
703
745
  ```python
@@ -295,6 +295,27 @@ class IamPolicy(pulumi.CustomResource):
295
295
  })
296
296
  ```
297
297
 
298
+ ## This resource supports User Project Overrides.
299
+
300
+ -
301
+
302
+ # IAM policy for BigQuery Table
303
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
304
+
305
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
306
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
307
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
308
+
309
+ A data source can be used to retrieve policy data in advent you do not need creation
310
+
311
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
312
+
313
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
314
+
315
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
316
+
317
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
318
+
298
319
  ## bigquery.IamPolicy
299
320
 
300
321
  ```python
@@ -569,6 +590,27 @@ class IamPolicy(pulumi.CustomResource):
569
590
  })
570
591
  ```
571
592
 
593
+ ## This resource supports User Project Overrides.
594
+
595
+ -
596
+
597
+ # IAM policy for BigQuery Table
598
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
599
+
600
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
601
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
602
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
603
+
604
+ A data source can be used to retrieve policy data in advent you do not need creation
605
+
606
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
607
+
608
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
609
+
610
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
611
+
612
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
613
+
572
614
  ## bigquery.IamPolicy
573
615
 
574
616
  ```python
@@ -367,6 +367,25 @@ class DataExchangeIamBinding(pulumi.CustomResource):
367
367
  member="user:jane@example.com")
368
368
  ```
369
369
 
370
+ ## This resource supports User Project Overrides.
371
+
372
+ -
373
+
374
+ # IAM policy for Bigquery Analytics Hub DataExchange
375
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
376
+
377
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
378
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
379
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
380
+
381
+ A data source can be used to retrieve policy data in advent you do not need creation
382
+
383
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
384
+
385
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
386
+
387
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
388
+
370
389
  ## bigqueryanalyticshub.DataExchangeIamPolicy
371
390
 
372
391
  ```python
@@ -540,6 +559,25 @@ class DataExchangeIamBinding(pulumi.CustomResource):
540
559
  member="user:jane@example.com")
541
560
  ```
542
561
 
562
+ ## This resource supports User Project Overrides.
563
+
564
+ -
565
+
566
+ # IAM policy for Bigquery Analytics Hub DataExchange
567
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
568
+
569
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
570
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
571
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
572
+
573
+ A data source can be used to retrieve policy data in advent you do not need creation
574
+
575
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
576
+
577
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
578
+
579
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
580
+
543
581
  ## bigqueryanalyticshub.DataExchangeIamPolicy
544
582
 
545
583
  ```python
@@ -367,6 +367,25 @@ class DataExchangeIamMember(pulumi.CustomResource):
367
367
  member="user:jane@example.com")
368
368
  ```
369
369
 
370
+ ## This resource supports User Project Overrides.
371
+
372
+ -
373
+
374
+ # IAM policy for Bigquery Analytics Hub DataExchange
375
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
376
+
377
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
378
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
379
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
380
+
381
+ A data source can be used to retrieve policy data in advent you do not need creation
382
+
383
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
384
+
385
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
386
+
387
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
388
+
370
389
  ## bigqueryanalyticshub.DataExchangeIamPolicy
371
390
 
372
391
  ```python
@@ -540,6 +559,25 @@ class DataExchangeIamMember(pulumi.CustomResource):
540
559
  member="user:jane@example.com")
541
560
  ```
542
561
 
562
+ ## This resource supports User Project Overrides.
563
+
564
+ -
565
+
566
+ # IAM policy for Bigquery Analytics Hub DataExchange
567
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
568
+
569
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
570
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
571
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
572
+
573
+ A data source can be used to retrieve policy data in advent you do not need creation
574
+
575
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
576
+
577
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
578
+
579
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
580
+
543
581
  ## bigqueryanalyticshub.DataExchangeIamPolicy
544
582
 
545
583
  ```python
@@ -264,6 +264,25 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
264
264
  member="user:jane@example.com")
265
265
  ```
266
266
 
267
+ ## This resource supports User Project Overrides.
268
+
269
+ -
270
+
271
+ # IAM policy for Bigquery Analytics Hub DataExchange
272
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
273
+
274
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
275
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
276
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
277
+
278
+ A data source can be used to retrieve policy data in advent you do not need creation
279
+
280
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
281
+
282
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
283
+
284
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
285
+
267
286
  ## bigqueryanalyticshub.DataExchangeIamPolicy
268
287
 
269
288
  ```python
@@ -425,6 +444,25 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
425
444
  member="user:jane@example.com")
426
445
  ```
427
446
 
447
+ ## This resource supports User Project Overrides.
448
+
449
+ -
450
+
451
+ # IAM policy for Bigquery Analytics Hub DataExchange
452
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
453
+
454
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
455
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
456
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
457
+
458
+ A data source can be used to retrieve policy data in advent you do not need creation
459
+
460
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
461
+
462
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
463
+
464
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
465
+
428
466
  ## bigqueryanalyticshub.DataExchangeIamPolicy
429
467
 
430
468
  ```python
@@ -402,6 +402,25 @@ class ListingIamBinding(pulumi.CustomResource):
402
402
  member="user:jane@example.com")
403
403
  ```
404
404
 
405
+ ## This resource supports User Project Overrides.
406
+
407
+ -
408
+
409
+ # IAM policy for Bigquery Analytics Hub Listing
410
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
411
+
412
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
413
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
414
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
415
+
416
+ A data source can be used to retrieve policy data in advent you do not need creation
417
+
418
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
419
+
420
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
421
+
422
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
423
+
405
424
  ## bigqueryanalyticshub.ListingIamPolicy
406
425
 
407
426
  ```python
@@ -582,6 +601,25 @@ class ListingIamBinding(pulumi.CustomResource):
582
601
  member="user:jane@example.com")
583
602
  ```
584
603
 
604
+ ## This resource supports User Project Overrides.
605
+
606
+ -
607
+
608
+ # IAM policy for Bigquery Analytics Hub Listing
609
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
610
+
611
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
612
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
613
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
614
+
615
+ A data source can be used to retrieve policy data in advent you do not need creation
616
+
617
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
618
+
619
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
620
+
621
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
622
+
585
623
  ## bigqueryanalyticshub.ListingIamPolicy
586
624
 
587
625
  ```python