pulumi-gcp 7.35.0a1722940030__py3-none-any.whl → 7.36.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.35.0a1722940030.dist-info → pulumi_gcp-7.36.0.dist-info}/top_level.txt +0 -0
@@ -402,9 +402,9 @@ class Key(pulumi.CustomResource):
402
402
  display_name="My Service Account")
403
403
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
404
404
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
405
- metadata=kubernetes.meta.v1.ObjectMetaArgs(
406
- name="google-application-credentials",
407
- ),
405
+ metadata={
406
+ "name": "google-application-credentials",
407
+ },
408
408
  data={
409
409
  "credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
410
410
  })
@@ -488,9 +488,9 @@ class Key(pulumi.CustomResource):
488
488
  display_name="My Service Account")
489
489
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
490
490
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
491
- metadata=kubernetes.meta.v1.ObjectMetaArgs(
492
- name="google-application-credentials",
493
- ),
491
+ metadata={
492
+ "name": "google-application-credentials",
493
+ },
494
494
  data={
495
495
  "credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
496
496
  })
@@ -280,6 +280,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Namespace
289
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
292
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
293
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
298
+
299
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class NamespaceIamBinding(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Namespace
462
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
465
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
466
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
471
+
472
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
437
477
 
438
478
  ```python
@@ -280,6 +280,26 @@ class NamespaceIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Namespace
289
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
292
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
293
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
298
+
299
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class NamespaceIamMember(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Namespace
462
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
465
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
466
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
471
+
472
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
437
477
 
438
478
  ```python
@@ -177,6 +177,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
+
182
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
+ ---
184
+
185
+ # IAM policy for Service Directory Namespace
186
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
187
+
188
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
189
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
190
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
191
+
192
+ A data source can be used to retrieve policy data in advent you do not need creation
193
+
194
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
195
+
196
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
197
+
198
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
199
+
180
200
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
181
201
 
182
202
  ```python
@@ -318,6 +338,26 @@ class NamespaceIamPolicy(pulumi.CustomResource):
318
338
  member="user:jane@example.com")
319
339
  ```
320
340
 
341
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
342
+
343
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
344
+ ---
345
+
346
+ # IAM policy for Service Directory Namespace
347
+ Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
348
+
349
+ * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
350
+ * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
351
+ * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
352
+
353
+ A data source can be used to retrieve policy data in advent you do not need creation
354
+
355
+ * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
356
+
357
+ > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
358
+
359
+ > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
360
+
321
361
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
322
362
 
323
363
  ```python
@@ -280,6 +280,26 @@ class ServiceIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Service
289
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
292
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
293
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
298
+
299
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_service\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class ServiceIamBinding(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Service
462
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
465
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
466
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
471
+
472
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_service\\_iam\\_policy
437
477
 
438
478
  ```python
@@ -280,6 +280,26 @@ class ServiceIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
+
285
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
+ ---
287
+
288
+ # IAM policy for Service Directory Service
289
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
290
+
291
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
292
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
293
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
294
+
295
+ A data source can be used to retrieve policy data in advent you do not need creation
296
+
297
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
298
+
299
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
300
+
301
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
302
+
283
303
  ## google\\_service\\_directory\\_service\\_iam\\_policy
284
304
 
285
305
  ```python
@@ -433,6 +453,26 @@ class ServiceIamMember(pulumi.CustomResource):
433
453
  member="user:jane@example.com")
434
454
  ```
435
455
 
456
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
+
458
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
+ ---
460
+
461
+ # IAM policy for Service Directory Service
462
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
463
+
464
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
465
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
466
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
467
+
468
+ A data source can be used to retrieve policy data in advent you do not need creation
469
+
470
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
471
+
472
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
473
+
474
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
475
+
436
476
  ## google\\_service\\_directory\\_service\\_iam\\_policy
437
477
 
438
478
  ```python
@@ -177,6 +177,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
+
182
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
+ ---
184
+
185
+ # IAM policy for Service Directory Service
186
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
187
+
188
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
189
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
190
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
191
+
192
+ A data source can be used to retrieve policy data in advent you do not need creation
193
+
194
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
195
+
196
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
197
+
198
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
199
+
180
200
  ## google\\_service\\_directory\\_service\\_iam\\_policy
181
201
 
182
202
  ```python
@@ -318,6 +338,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
318
338
  member="user:jane@example.com")
319
339
  ```
320
340
 
341
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
342
+
343
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
344
+ ---
345
+
346
+ # IAM policy for Service Directory Service
347
+ Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
348
+
349
+ * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
350
+ * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
351
+ * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
352
+
353
+ A data source can be used to retrieve policy data in advent you do not need creation
354
+
355
+ * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
356
+
357
+ > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
358
+
359
+ > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
360
+
321
361
  ## google\\_service\\_directory\\_service\\_iam\\_policy
322
362
 
323
363
  ```python
@@ -319,6 +319,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Source Repositories Repository
327
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
328
+
329
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
330
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
331
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
336
+
337
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## sourcerepo.RepositoryIamPolicy
323
342
 
324
343
  ```python
@@ -478,6 +497,25 @@ class RepositoryIamBinding(pulumi.CustomResource):
478
497
  member="user:jane@example.com")
479
498
  ```
480
499
 
500
+ ## This resource supports User Project Overrides.
501
+
502
+ -
503
+
504
+ # IAM policy for Cloud Source Repositories Repository
505
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
506
+
507
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
508
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
509
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
510
+
511
+ A data source can be used to retrieve policy data in advent you do not need creation
512
+
513
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
514
+
515
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
516
+
517
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
518
+
481
519
  ## sourcerepo.RepositoryIamPolicy
482
520
 
483
521
  ```python
@@ -319,6 +319,25 @@ class RepositoryIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud Source Repositories Repository
327
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
328
+
329
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
330
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
331
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
336
+
337
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## sourcerepo.RepositoryIamPolicy
323
342
 
324
343
  ```python
@@ -478,6 +497,25 @@ class RepositoryIamMember(pulumi.CustomResource):
478
497
  member="user:jane@example.com")
479
498
  ```
480
499
 
500
+ ## This resource supports User Project Overrides.
501
+
502
+ -
503
+
504
+ # IAM policy for Cloud Source Repositories Repository
505
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
506
+
507
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
508
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
509
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
510
+
511
+ A data source can be used to retrieve policy data in advent you do not need creation
512
+
513
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
514
+
515
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
516
+
517
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
518
+
481
519
  ## sourcerepo.RepositoryIamPolicy
482
520
 
483
521
  ```python
@@ -216,6 +216,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
+ ## This resource supports User Project Overrides.
220
+
221
+ -
222
+
223
+ # IAM policy for Cloud Source Repositories Repository
224
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
225
+
226
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
227
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
228
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
229
+
230
+ A data source can be used to retrieve policy data in advent you do not need creation
231
+
232
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
233
+
234
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
235
+
236
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
237
+
219
238
  ## sourcerepo.RepositoryIamPolicy
220
239
 
221
240
  ```python
@@ -363,6 +382,25 @@ class RepositoryIamPolicy(pulumi.CustomResource):
363
382
  member="user:jane@example.com")
364
383
  ```
365
384
 
385
+ ## This resource supports User Project Overrides.
386
+
387
+ -
388
+
389
+ # IAM policy for Cloud Source Repositories Repository
390
+ Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
391
+
392
+ * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
393
+ * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
394
+ * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
395
+
396
+ A data source can be used to retrieve policy data in advent you do not need creation
397
+
398
+ * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
399
+
400
+ > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
401
+
402
+ > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
403
+
366
404
  ## sourcerepo.RepositoryIamPolicy
367
405
 
368
406
  ```python
@@ -407,43 +407,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
407
407
  })
408
408
  ```
409
409
 
410
- ## spanner.DatabaseIAMPolicy
411
-
412
- ```python
413
- import pulumi
414
- import pulumi_gcp as gcp
415
-
416
- admin = gcp.organizations.get_iam_policy(bindings=[{
417
- "role": "roles/editor",
418
- "members": ["user:jane@example.com"],
419
- }])
420
- database = gcp.spanner.DatabaseIAMPolicy("database",
421
- instance="your-instance-name",
422
- database="your-database-name",
423
- policy_data=admin.policy_data)
424
- ```
425
-
426
- With IAM Conditions:
427
-
428
- ```python
429
- import pulumi
430
- import pulumi_gcp as gcp
431
-
432
- admin = gcp.organizations.get_iam_policy(bindings=[{
433
- "role": "roles/editor",
434
- "members": ["user:jane@example.com"],
435
- "condition": {
436
- "title": "My Role",
437
- "description": "Grant permissions on my_role",
438
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
439
- },
440
- }])
441
- database = gcp.spanner.DatabaseIAMPolicy("database",
442
- instance="your-instance-name",
443
- database="your-database-name",
444
- policy_data=admin.policy_data)
445
- ```
446
-
447
410
  ## spanner.DatabaseIAMBinding
448
411
 
449
412
  ```python
@@ -671,43 +634,6 @@ class DatabaseIAMBinding(pulumi.CustomResource):
671
634
  })
672
635
  ```
673
636
 
674
- ## spanner.DatabaseIAMPolicy
675
-
676
- ```python
677
- import pulumi
678
- import pulumi_gcp as gcp
679
-
680
- admin = gcp.organizations.get_iam_policy(bindings=[{
681
- "role": "roles/editor",
682
- "members": ["user:jane@example.com"],
683
- }])
684
- database = gcp.spanner.DatabaseIAMPolicy("database",
685
- instance="your-instance-name",
686
- database="your-database-name",
687
- policy_data=admin.policy_data)
688
- ```
689
-
690
- With IAM Conditions:
691
-
692
- ```python
693
- import pulumi
694
- import pulumi_gcp as gcp
695
-
696
- admin = gcp.organizations.get_iam_policy(bindings=[{
697
- "role": "roles/editor",
698
- "members": ["user:jane@example.com"],
699
- "condition": {
700
- "title": "My Role",
701
- "description": "Grant permissions on my_role",
702
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
703
- },
704
- }])
705
- database = gcp.spanner.DatabaseIAMPolicy("database",
706
- instance="your-instance-name",
707
- database="your-database-name",
708
- policy_data=admin.policy_data)
709
- ```
710
-
711
637
  ## spanner.DatabaseIAMBinding
712
638
 
713
639
  ```python