pulumi-gcp 7.35.0a1722924350__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (287) hide show
  1. pulumi_gcp/accesscontextmanager/_inputs.py +12 -3
  2. pulumi_gcp/accesscontextmanager/access_policy.py +18 -18
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  4. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  5. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  6. pulumi_gcp/accesscontextmanager/outputs.py +8 -2
  7. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  13. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  14. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  15. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  16. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  17. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  18. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  19. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  20. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  21. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  23. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  24. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  25. pulumi_gcp/bigquery/data_transfer_config.py +52 -0
  26. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  27. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  28. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  29. pulumi_gcp/bigquery/iam_binding.py +42 -0
  30. pulumi_gcp/bigquery/iam_member.py +42 -0
  31. pulumi_gcp/bigquery/iam_policy.py +42 -0
  32. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  34. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  35. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  36. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  37. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  38. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  39. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  40. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  41. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  42. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  43. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  44. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  45. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  46. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  47. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  48. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  49. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  50. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  51. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  52. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  53. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  54. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  55. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  56. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  57. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  58. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  59. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  60. pulumi_gcp/cloudrun/iam_member.py +38 -0
  61. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  62. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  63. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  64. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  65. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  66. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  67. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  68. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  69. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  70. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  71. pulumi_gcp/compute/_inputs.py +24 -24
  72. pulumi_gcp/compute/disk.py +75 -0
  73. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  74. pulumi_gcp/compute/disk_iam_member.py +38 -0
  75. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  76. pulumi_gcp/compute/get_disk.py +11 -1
  77. pulumi_gcp/compute/get_hc_vpn_gateway.py +11 -1
  78. pulumi_gcp/compute/get_instance_template.py +2 -2
  79. pulumi_gcp/compute/get_region_instance_template.py +2 -2
  80. pulumi_gcp/compute/get_snapshot.py +2 -2
  81. pulumi_gcp/compute/ha_vpn_gateway.py +68 -7
  82. pulumi_gcp/compute/image_iam_binding.py +42 -0
  83. pulumi_gcp/compute/image_iam_member.py +42 -0
  84. pulumi_gcp/compute/image_iam_policy.py +42 -0
  85. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  86. pulumi_gcp/compute/instance_iam_member.py +42 -0
  87. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  88. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  89. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  90. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  91. pulumi_gcp/compute/outputs.py +24 -24
  92. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  93. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  94. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  95. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  96. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  97. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  98. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  99. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  100. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  101. pulumi_gcp/container/_inputs.py +3 -3
  102. pulumi_gcp/container/outputs.py +2 -2
  103. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  104. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  105. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  106. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  107. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  108. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  109. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  110. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  111. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  112. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  113. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  114. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  115. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  116. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  117. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  127. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  128. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  129. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  130. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  131. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  132. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  133. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  134. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  135. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  136. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  137. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  138. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  139. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  140. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  141. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  142. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  143. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  144. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  154. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  155. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  156. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  157. pulumi_gcp/firebase/project.py +10 -2
  158. pulumi_gcp/folder/iam_audit_config.py +0 -86
  159. pulumi_gcp/folder/iam_member.py +0 -86
  160. pulumi_gcp/folder/iam_policy.py +0 -86
  161. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  163. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  164. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  165. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  166. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  167. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  168. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  169. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  170. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  171. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  172. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  173. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  174. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  175. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  176. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  177. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  178. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  179. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  180. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  181. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  182. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  183. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  184. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  185. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  186. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  187. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  188. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  189. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  190. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  191. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  192. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  193. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  194. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  195. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  196. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  197. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  198. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  199. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  200. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  201. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  202. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  203. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  204. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  205. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  206. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  207. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  208. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  209. pulumi_gcp/iap/web_iam_binding.py +42 -0
  210. pulumi_gcp/iap/web_iam_member.py +42 -0
  211. pulumi_gcp/iap/web_iam_policy.py +42 -0
  212. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  213. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  214. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  215. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  216. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  217. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  218. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  219. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  220. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  221. pulumi_gcp/kms/key_handle.py +7 -7
  222. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  223. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  224. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  225. pulumi_gcp/migrationcenter/_inputs.py +21 -129
  226. pulumi_gcp/migrationcenter/outputs.py +14 -86
  227. pulumi_gcp/networkconnectivity/hub.py +69 -0
  228. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  229. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  230. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  231. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  232. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  233. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  234. pulumi_gcp/organizations/iam_member.py +0 -94
  235. pulumi_gcp/organizations/iam_policy.py +0 -94
  236. pulumi_gcp/organizations/project.py +16 -7
  237. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  238. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  239. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  240. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  241. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  242. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  243. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  244. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  245. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  246. pulumi_gcp/pulumi-plugin.json +1 -1
  247. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  248. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  249. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  250. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  251. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  252. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  253. pulumi_gcp/serviceaccount/get_account.py +6 -6
  254. pulumi_gcp/serviceaccount/key.py +6 -6
  255. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  256. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  257. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  258. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  259. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  260. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  261. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  262. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  263. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  264. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  265. pulumi_gcp/spanner/database_iam_member.py +0 -74
  266. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  267. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  268. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  269. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  270. pulumi_gcp/sql/_inputs.py +35 -15
  271. pulumi_gcp/sql/outputs.py +50 -14
  272. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  273. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  274. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  275. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  276. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  277. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  278. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  279. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  280. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  281. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  282. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  283. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  284. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  285. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +287 -287
  286. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  287. {pulumi_gcp-7.35.0a1722924350.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -423,6 +423,27 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
423
423
  })
424
424
  ```
425
425
 
426
+ ## This resource supports User Project Overrides.
427
+
428
+ -
429
+
430
+ # IAM policy for Certificate Authority Service CertificateTemplate
431
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
432
+
433
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
434
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
435
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
436
+
437
+ A data source can be used to retrieve policy data in advent you do not need creation
438
+
439
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
440
+
441
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
442
+
443
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
444
+
445
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
446
+
426
447
  ## certificateauthority.CertificateTemplateIamPolicy
427
448
 
428
449
  ```python
@@ -689,6 +710,27 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
689
710
  })
690
711
  ```
691
712
 
713
+ ## This resource supports User Project Overrides.
714
+
715
+ -
716
+
717
+ # IAM policy for Certificate Authority Service CertificateTemplate
718
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
719
+
720
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
721
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
722
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
723
+
724
+ A data source can be used to retrieve policy data in advent you do not need creation
725
+
726
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
727
+
728
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
729
+
730
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
731
+
732
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
733
+
692
734
  ## certificateauthority.CertificateTemplateIamPolicy
693
735
 
694
736
  ```python
@@ -423,6 +423,27 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
423
423
  })
424
424
  ```
425
425
 
426
+ ## This resource supports User Project Overrides.
427
+
428
+ -
429
+
430
+ # IAM policy for Certificate Authority Service CertificateTemplate
431
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
432
+
433
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
434
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
435
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
436
+
437
+ A data source can be used to retrieve policy data in advent you do not need creation
438
+
439
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
440
+
441
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
442
+
443
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
444
+
445
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
446
+
426
447
  ## certificateauthority.CertificateTemplateIamPolicy
427
448
 
428
449
  ```python
@@ -689,6 +710,27 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
689
710
  })
690
711
  ```
691
712
 
713
+ ## This resource supports User Project Overrides.
714
+
715
+ -
716
+
717
+ # IAM policy for Certificate Authority Service CertificateTemplate
718
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
719
+
720
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
721
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
722
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
723
+
724
+ A data source can be used to retrieve policy data in advent you do not need creation
725
+
726
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
727
+
728
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
729
+
730
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
731
+
732
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
733
+
692
734
  ## certificateauthority.CertificateTemplateIamPolicy
693
735
 
694
736
  ```python
@@ -308,6 +308,27 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
308
308
  })
309
309
  ```
310
310
 
311
+ ## This resource supports User Project Overrides.
312
+
313
+ -
314
+
315
+ # IAM policy for Certificate Authority Service CertificateTemplate
316
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
317
+
318
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
319
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
320
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
321
+
322
+ A data source can be used to retrieve policy data in advent you do not need creation
323
+
324
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
325
+
326
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
327
+
328
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
329
+
330
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
331
+
311
332
  ## certificateauthority.CertificateTemplateIamPolicy
312
333
 
313
334
  ```python
@@ -560,6 +581,27 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
560
581
  })
561
582
  ```
562
583
 
584
+ ## This resource supports User Project Overrides.
585
+
586
+ -
587
+
588
+ # IAM policy for Certificate Authority Service CertificateTemplate
589
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
590
+
591
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
592
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
593
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
594
+
595
+ A data source can be used to retrieve policy data in advent you do not need creation
596
+
597
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
598
+
599
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
600
+
601
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
602
+
603
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
604
+
563
605
  ## certificateauthority.CertificateTemplateIamPolicy
564
606
 
565
607
  ```python
@@ -364,6 +364,25 @@ class ConnectionIAMBinding(pulumi.CustomResource):
364
364
  member="user:jane@example.com")
365
365
  ```
366
366
 
367
+ ## This resource supports User Project Overrides.
368
+
369
+ -
370
+
371
+ # IAM policy for Cloud Build v2 Connection
372
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
373
+
374
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
375
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
376
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
377
+
378
+ A data source can be used to retrieve policy data in advent you do not need creation
379
+
380
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
381
+
382
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
383
+
384
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
385
+
367
386
  ## cloudbuildv2.ConnectionIAMPolicy
368
387
 
369
388
  ```python
@@ -536,6 +555,25 @@ class ConnectionIAMBinding(pulumi.CustomResource):
536
555
  member="user:jane@example.com")
537
556
  ```
538
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for Cloud Build v2 Connection
563
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
564
+
565
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
566
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
567
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
572
+
573
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
576
+
539
577
  ## cloudbuildv2.ConnectionIAMPolicy
540
578
 
541
579
  ```python
@@ -364,6 +364,25 @@ class ConnectionIAMMember(pulumi.CustomResource):
364
364
  member="user:jane@example.com")
365
365
  ```
366
366
 
367
+ ## This resource supports User Project Overrides.
368
+
369
+ -
370
+
371
+ # IAM policy for Cloud Build v2 Connection
372
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
373
+
374
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
375
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
376
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
377
+
378
+ A data source can be used to retrieve policy data in advent you do not need creation
379
+
380
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
381
+
382
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
383
+
384
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
385
+
367
386
  ## cloudbuildv2.ConnectionIAMPolicy
368
387
 
369
388
  ```python
@@ -536,6 +555,25 @@ class ConnectionIAMMember(pulumi.CustomResource):
536
555
  member="user:jane@example.com")
537
556
  ```
538
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for Cloud Build v2 Connection
563
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
564
+
565
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
566
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
567
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
572
+
573
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
576
+
539
577
  ## cloudbuildv2.ConnectionIAMPolicy
540
578
 
541
579
  ```python
@@ -261,6 +261,25 @@ class ConnectionIAMPolicy(pulumi.CustomResource):
261
261
  member="user:jane@example.com")
262
262
  ```
263
263
 
264
+ ## This resource supports User Project Overrides.
265
+
266
+ -
267
+
268
+ # IAM policy for Cloud Build v2 Connection
269
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
270
+
271
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
272
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
273
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
274
+
275
+ A data source can be used to retrieve policy data in advent you do not need creation
276
+
277
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
278
+
279
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
280
+
281
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
282
+
264
283
  ## cloudbuildv2.ConnectionIAMPolicy
265
284
 
266
285
  ```python
@@ -421,6 +440,25 @@ class ConnectionIAMPolicy(pulumi.CustomResource):
421
440
  member="user:jane@example.com")
422
441
  ```
423
442
 
443
+ ## This resource supports User Project Overrides.
444
+
445
+ -
446
+
447
+ # IAM policy for Cloud Build v2 Connection
448
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
449
+
450
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
451
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
452
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
453
+
454
+ A data source can be used to retrieve policy data in advent you do not need creation
455
+
456
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
457
+
458
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
459
+
460
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
461
+
424
462
  ## cloudbuildv2.ConnectionIAMPolicy
425
463
 
426
464
  ```python
@@ -363,6 +363,25 @@ class FunctionIamBinding(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
+ ## This resource supports User Project Overrides.
367
+
368
+ -
369
+
370
+ # IAM policy for Cloud Functions CloudFunction
371
+ Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
372
+
373
+ * `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
374
+ * `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
375
+ * `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
376
+
377
+ A data source can be used to retrieve policy data in advent you do not need creation
378
+
379
+ * `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
380
+
381
+ > **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
382
+
383
+ > **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
384
+
366
385
  ## cloudfunctions.FunctionIamPolicy
367
386
 
368
387
  ```python
@@ -535,6 +554,25 @@ class FunctionIamBinding(pulumi.CustomResource):
535
554
  member="user:jane@example.com")
536
555
  ```
537
556
 
557
+ ## This resource supports User Project Overrides.
558
+
559
+ -
560
+
561
+ # IAM policy for Cloud Functions CloudFunction
562
+ Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
563
+
564
+ * `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
565
+ * `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
566
+ * `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
567
+
568
+ A data source can be used to retrieve policy data in advent you do not need creation
569
+
570
+ * `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
571
+
572
+ > **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
573
+
574
+ > **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
575
+
538
576
  ## cloudfunctions.FunctionIamPolicy
539
577
 
540
578
  ```python
@@ -363,6 +363,25 @@ class FunctionIamMember(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
+ ## This resource supports User Project Overrides.
367
+
368
+ -
369
+
370
+ # IAM policy for Cloud Functions CloudFunction
371
+ Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
372
+
373
+ * `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
374
+ * `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
375
+ * `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
376
+
377
+ A data source can be used to retrieve policy data in advent you do not need creation
378
+
379
+ * `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
380
+
381
+ > **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
382
+
383
+ > **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
384
+
366
385
  ## cloudfunctions.FunctionIamPolicy
367
386
 
368
387
  ```python
@@ -535,6 +554,25 @@ class FunctionIamMember(pulumi.CustomResource):
535
554
  member="user:jane@example.com")
536
555
  ```
537
556
 
557
+ ## This resource supports User Project Overrides.
558
+
559
+ -
560
+
561
+ # IAM policy for Cloud Functions CloudFunction
562
+ Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
563
+
564
+ * `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
565
+ * `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
566
+ * `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
567
+
568
+ A data source can be used to retrieve policy data in advent you do not need creation
569
+
570
+ * `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
571
+
572
+ > **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
573
+
574
+ > **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
575
+
538
576
  ## cloudfunctions.FunctionIamPolicy
539
577
 
540
578
  ```python
@@ -260,6 +260,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
260
260
  member="user:jane@example.com")
261
261
  ```
262
262
 
263
+ ## This resource supports User Project Overrides.
264
+
265
+ -
266
+
267
+ # IAM policy for Cloud Functions CloudFunction
268
+ Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
269
+
270
+ * `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
271
+ * `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
272
+ * `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
273
+
274
+ A data source can be used to retrieve policy data in advent you do not need creation
275
+
276
+ * `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
277
+
278
+ > **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
279
+
280
+ > **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
281
+
263
282
  ## cloudfunctions.FunctionIamPolicy
264
283
 
265
284
  ```python
@@ -420,6 +439,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
420
439
  member="user:jane@example.com")
421
440
  ```
422
441
 
442
+ ## This resource supports User Project Overrides.
443
+
444
+ -
445
+
446
+ # IAM policy for Cloud Functions CloudFunction
447
+ Three different resources help you manage your IAM policy for Cloud Functions CloudFunction. Each of these resources serves a different use case:
448
+
449
+ * `cloudfunctions.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the cloudfunction and replaces any existing policy already attached.
450
+ * `cloudfunctions.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the cloudfunction are preserved.
451
+ * `cloudfunctions.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the cloudfunction are preserved.
452
+
453
+ A data source can be used to retrieve policy data in advent you do not need creation
454
+
455
+ * `cloudfunctions.FunctionIamPolicy`: Retrieves the IAM policy for the cloudfunction
456
+
457
+ > **Note:** `cloudfunctions.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctions.FunctionIamBinding` and `cloudfunctions.FunctionIamMember` or they will fight over what your policy should be.
458
+
459
+ > **Note:** `cloudfunctions.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctions.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
460
+
423
461
  ## cloudfunctions.FunctionIamPolicy
424
462
 
425
463
  ```python
@@ -363,6 +363,25 @@ class FunctionIamBinding(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
+ ## This resource supports User Project Overrides.
367
+
368
+ -
369
+
370
+ # IAM policy for Cloud Functions (2nd gen) function
371
+ Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
372
+
373
+ * `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
374
+ * `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
375
+ * `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
376
+
377
+ A data source can be used to retrieve policy data in advent you do not need creation
378
+
379
+ * `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
380
+
381
+ > **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
382
+
383
+ > **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
384
+
366
385
  ## cloudfunctionsv2.FunctionIamPolicy
367
386
 
368
387
  ```python
@@ -535,6 +554,25 @@ class FunctionIamBinding(pulumi.CustomResource):
535
554
  member="user:jane@example.com")
536
555
  ```
537
556
 
557
+ ## This resource supports User Project Overrides.
558
+
559
+ -
560
+
561
+ # IAM policy for Cloud Functions (2nd gen) function
562
+ Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
563
+
564
+ * `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
565
+ * `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
566
+ * `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
567
+
568
+ A data source can be used to retrieve policy data in advent you do not need creation
569
+
570
+ * `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
571
+
572
+ > **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
573
+
574
+ > **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
575
+
538
576
  ## cloudfunctionsv2.FunctionIamPolicy
539
577
 
540
578
  ```python
@@ -363,6 +363,25 @@ class FunctionIamMember(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
+ ## This resource supports User Project Overrides.
367
+
368
+ -
369
+
370
+ # IAM policy for Cloud Functions (2nd gen) function
371
+ Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
372
+
373
+ * `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
374
+ * `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
375
+ * `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
376
+
377
+ A data source can be used to retrieve policy data in advent you do not need creation
378
+
379
+ * `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
380
+
381
+ > **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
382
+
383
+ > **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
384
+
366
385
  ## cloudfunctionsv2.FunctionIamPolicy
367
386
 
368
387
  ```python
@@ -535,6 +554,25 @@ class FunctionIamMember(pulumi.CustomResource):
535
554
  member="user:jane@example.com")
536
555
  ```
537
556
 
557
+ ## This resource supports User Project Overrides.
558
+
559
+ -
560
+
561
+ # IAM policy for Cloud Functions (2nd gen) function
562
+ Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
563
+
564
+ * `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
565
+ * `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
566
+ * `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
567
+
568
+ A data source can be used to retrieve policy data in advent you do not need creation
569
+
570
+ * `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
571
+
572
+ > **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
573
+
574
+ > **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
575
+
538
576
  ## cloudfunctionsv2.FunctionIamPolicy
539
577
 
540
578
  ```python
@@ -260,6 +260,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
260
260
  member="user:jane@example.com")
261
261
  ```
262
262
 
263
+ ## This resource supports User Project Overrides.
264
+
265
+ -
266
+
267
+ # IAM policy for Cloud Functions (2nd gen) function
268
+ Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
269
+
270
+ * `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
271
+ * `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
272
+ * `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
273
+
274
+ A data source can be used to retrieve policy data in advent you do not need creation
275
+
276
+ * `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
277
+
278
+ > **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
279
+
280
+ > **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
281
+
263
282
  ## cloudfunctionsv2.FunctionIamPolicy
264
283
 
265
284
  ```python
@@ -420,6 +439,25 @@ class FunctionIamPolicy(pulumi.CustomResource):
420
439
  member="user:jane@example.com")
421
440
  ```
422
441
 
442
+ ## This resource supports User Project Overrides.
443
+
444
+ -
445
+
446
+ # IAM policy for Cloud Functions (2nd gen) function
447
+ Three different resources help you manage your IAM policy for Cloud Functions (2nd gen) function. Each of these resources serves a different use case:
448
+
449
+ * `cloudfunctionsv2.FunctionIamPolicy`: Authoritative. Sets the IAM policy for the function and replaces any existing policy already attached.
450
+ * `cloudfunctionsv2.FunctionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the function are preserved.
451
+ * `cloudfunctionsv2.FunctionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the function are preserved.
452
+
453
+ A data source can be used to retrieve policy data in advent you do not need creation
454
+
455
+ * `cloudfunctionsv2.FunctionIamPolicy`: Retrieves the IAM policy for the function
456
+
457
+ > **Note:** `cloudfunctionsv2.FunctionIamPolicy` **cannot** be used in conjunction with `cloudfunctionsv2.FunctionIamBinding` and `cloudfunctionsv2.FunctionIamMember` or they will fight over what your policy should be.
458
+
459
+ > **Note:** `cloudfunctionsv2.FunctionIamBinding` resources **can be** used in conjunction with `cloudfunctionsv2.FunctionIamMember` resources **only if** they do not grant privilege to the same role.
460
+
423
461
  ## cloudfunctionsv2.FunctionIamPolicy
424
462
 
425
463
  ```python