pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -364,25 +364,6 @@ class FeatureIamMember(pulumi.CustomResource):
364
364
  member="user:jane@example.com")
365
365
  ```
366
366
 
367
- ## This resource supports User Project Overrides.
368
-
369
- -
370
-
371
- # IAM policy for GKEHub Feature
372
- Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
373
-
374
- * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
375
- * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
376
- * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
377
-
378
- A data source can be used to retrieve policy data in advent you do not need creation
379
-
380
- * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
381
-
382
- > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
383
-
384
- > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
385
-
386
367
  ## gkehub.FeatureIamPolicy
387
368
 
388
369
  ```python
@@ -555,25 +536,6 @@ class FeatureIamMember(pulumi.CustomResource):
555
536
  member="user:jane@example.com")
556
537
  ```
557
538
 
558
- ## This resource supports User Project Overrides.
559
-
560
- -
561
-
562
- # IAM policy for GKEHub Feature
563
- Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
564
-
565
- * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
566
- * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
567
- * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
568
-
569
- A data source can be used to retrieve policy data in advent you do not need creation
570
-
571
- * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
572
-
573
- > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
574
-
575
- > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
576
-
577
539
  ## gkehub.FeatureIamPolicy
578
540
 
579
541
  ```python
@@ -261,25 +261,6 @@ class FeatureIamPolicy(pulumi.CustomResource):
261
261
  member="user:jane@example.com")
262
262
  ```
263
263
 
264
- ## This resource supports User Project Overrides.
265
-
266
- -
267
-
268
- # IAM policy for GKEHub Feature
269
- Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
270
-
271
- * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
272
- * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
273
- * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
274
-
275
- A data source can be used to retrieve policy data in advent you do not need creation
276
-
277
- * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
278
-
279
- > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
280
-
281
- > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
282
-
283
264
  ## gkehub.FeatureIamPolicy
284
265
 
285
266
  ```python
@@ -440,25 +421,6 @@ class FeatureIamPolicy(pulumi.CustomResource):
440
421
  member="user:jane@example.com")
441
422
  ```
442
423
 
443
- ## This resource supports User Project Overrides.
444
-
445
- -
446
-
447
- # IAM policy for GKEHub Feature
448
- Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
449
-
450
- * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
451
- * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
452
- * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
453
-
454
- A data source can be used to retrieve policy data in advent you do not need creation
455
-
456
- * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
457
-
458
- > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
459
-
460
- > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
461
-
462
424
  ## gkehub.FeatureIamPolicy
463
425
 
464
426
  ```python
@@ -363,25 +363,6 @@ class MembershipIamBinding(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
- ## This resource supports User Project Overrides.
367
-
368
- -
369
-
370
- # IAM policy for GKEHub Membership
371
- Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
372
-
373
- * `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
374
- * `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
375
- * `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
376
-
377
- A data source can be used to retrieve policy data in advent you do not need creation
378
-
379
- * `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
380
-
381
- > **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
382
-
383
- > **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
384
-
385
366
  ## gkehub.MembershipIamPolicy
386
367
 
387
368
  ```python
@@ -555,25 +536,6 @@ class MembershipIamBinding(pulumi.CustomResource):
555
536
  member="user:jane@example.com")
556
537
  ```
557
538
 
558
- ## This resource supports User Project Overrides.
559
-
560
- -
561
-
562
- # IAM policy for GKEHub Membership
563
- Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
564
-
565
- * `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
566
- * `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
567
- * `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
568
-
569
- A data source can be used to retrieve policy data in advent you do not need creation
570
-
571
- * `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
572
-
573
- > **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
574
-
575
- > **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
576
-
577
539
  ## gkehub.MembershipIamPolicy
578
540
 
579
541
  ```python
@@ -363,25 +363,6 @@ class MembershipIamMember(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
- ## This resource supports User Project Overrides.
367
-
368
- -
369
-
370
- # IAM policy for GKEHub Membership
371
- Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
372
-
373
- * `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
374
- * `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
375
- * `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
376
-
377
- A data source can be used to retrieve policy data in advent you do not need creation
378
-
379
- * `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
380
-
381
- > **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
382
-
383
- > **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
384
-
385
366
  ## gkehub.MembershipIamPolicy
386
367
 
387
368
  ```python
@@ -555,25 +536,6 @@ class MembershipIamMember(pulumi.CustomResource):
555
536
  member="user:jane@example.com")
556
537
  ```
557
538
 
558
- ## This resource supports User Project Overrides.
559
-
560
- -
561
-
562
- # IAM policy for GKEHub Membership
563
- Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
564
-
565
- * `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
566
- * `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
567
- * `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
568
-
569
- A data source can be used to retrieve policy data in advent you do not need creation
570
-
571
- * `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
572
-
573
- > **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
574
-
575
- > **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
576
-
577
539
  ## gkehub.MembershipIamPolicy
578
540
 
579
541
  ```python
@@ -260,25 +260,6 @@ class MembershipIamPolicy(pulumi.CustomResource):
260
260
  member="user:jane@example.com")
261
261
  ```
262
262
 
263
- ## This resource supports User Project Overrides.
264
-
265
- -
266
-
267
- # IAM policy for GKEHub Membership
268
- Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
269
-
270
- * `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
271
- * `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
272
- * `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
273
-
274
- A data source can be used to retrieve policy data in advent you do not need creation
275
-
276
- * `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
277
-
278
- > **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
279
-
280
- > **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
281
-
282
263
  ## gkehub.MembershipIamPolicy
283
264
 
284
265
  ```python
@@ -440,25 +421,6 @@ class MembershipIamPolicy(pulumi.CustomResource):
440
421
  member="user:jane@example.com")
441
422
  ```
442
423
 
443
- ## This resource supports User Project Overrides.
444
-
445
- -
446
-
447
- # IAM policy for GKEHub Membership
448
- Three different resources help you manage your IAM policy for GKEHub Membership. Each of these resources serves a different use case:
449
-
450
- * `gkehub.MembershipIamPolicy`: Authoritative. Sets the IAM policy for the membership and replaces any existing policy already attached.
451
- * `gkehub.MembershipIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the membership are preserved.
452
- * `gkehub.MembershipIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the membership are preserved.
453
-
454
- A data source can be used to retrieve policy data in advent you do not need creation
455
-
456
- * `gkehub.MembershipIamPolicy`: Retrieves the IAM policy for the membership
457
-
458
- > **Note:** `gkehub.MembershipIamPolicy` **cannot** be used in conjunction with `gkehub.MembershipIamBinding` and `gkehub.MembershipIamMember` or they will fight over what your policy should be.
459
-
460
- > **Note:** `gkehub.MembershipIamBinding` resources **can be** used in conjunction with `gkehub.MembershipIamMember` resources **only if** they do not grant privilege to the same role.
461
-
462
424
  ## gkehub.MembershipIamPolicy
463
425
 
464
426
  ```python
@@ -311,25 +311,6 @@ class ScopeIamBinding(pulumi.CustomResource):
311
311
  member="user:jane@example.com")
312
312
  ```
313
313
 
314
- ## This resource supports User Project Overrides.
315
-
316
- -
317
-
318
- # IAM policy for GKEHub Scope
319
- Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
320
-
321
- * `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
322
- * `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
323
- * `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
324
-
325
- A data source can be used to retrieve policy data in advent you do not need creation
326
-
327
- * `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
328
-
329
- > **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
330
-
331
- > **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
332
-
333
314
  ## gkehub.ScopeIamPolicy
334
315
 
335
316
  ```python
@@ -490,25 +471,6 @@ class ScopeIamBinding(pulumi.CustomResource):
490
471
  member="user:jane@example.com")
491
472
  ```
492
473
 
493
- ## This resource supports User Project Overrides.
494
-
495
- -
496
-
497
- # IAM policy for GKEHub Scope
498
- Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
499
-
500
- * `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
501
- * `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
502
- * `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
503
-
504
- A data source can be used to retrieve policy data in advent you do not need creation
505
-
506
- * `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
507
-
508
- > **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
509
-
510
- > **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
511
-
512
474
  ## gkehub.ScopeIamPolicy
513
475
 
514
476
  ```python
@@ -311,25 +311,6 @@ class ScopeIamMember(pulumi.CustomResource):
311
311
  member="user:jane@example.com")
312
312
  ```
313
313
 
314
- ## This resource supports User Project Overrides.
315
-
316
- -
317
-
318
- # IAM policy for GKEHub Scope
319
- Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
320
-
321
- * `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
322
- * `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
323
- * `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
324
-
325
- A data source can be used to retrieve policy data in advent you do not need creation
326
-
327
- * `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
328
-
329
- > **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
330
-
331
- > **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
332
-
333
314
  ## gkehub.ScopeIamPolicy
334
315
 
335
316
  ```python
@@ -490,25 +471,6 @@ class ScopeIamMember(pulumi.CustomResource):
490
471
  member="user:jane@example.com")
491
472
  ```
492
473
 
493
- ## This resource supports User Project Overrides.
494
-
495
- -
496
-
497
- # IAM policy for GKEHub Scope
498
- Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
499
-
500
- * `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
501
- * `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
502
- * `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
503
-
504
- A data source can be used to retrieve policy data in advent you do not need creation
505
-
506
- * `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
507
-
508
- > **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
509
-
510
- > **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
511
-
512
474
  ## gkehub.ScopeIamPolicy
513
475
 
514
476
  ```python
@@ -208,25 +208,6 @@ class ScopeIamPolicy(pulumi.CustomResource):
208
208
  member="user:jane@example.com")
209
209
  ```
210
210
 
211
- ## This resource supports User Project Overrides.
212
-
213
- -
214
-
215
- # IAM policy for GKEHub Scope
216
- Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
217
-
218
- * `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
219
- * `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
220
- * `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
221
-
222
- A data source can be used to retrieve policy data in advent you do not need creation
223
-
224
- * `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
225
-
226
- > **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
227
-
228
- > **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
229
-
230
211
  ## gkehub.ScopeIamPolicy
231
212
 
232
213
  ```python
@@ -375,25 +356,6 @@ class ScopeIamPolicy(pulumi.CustomResource):
375
356
  member="user:jane@example.com")
376
357
  ```
377
358
 
378
- ## This resource supports User Project Overrides.
379
-
380
- -
381
-
382
- # IAM policy for GKEHub Scope
383
- Three different resources help you manage your IAM policy for GKEHub Scope. Each of these resources serves a different use case:
384
-
385
- * `gkehub.ScopeIamPolicy`: Authoritative. Sets the IAM policy for the scope and replaces any existing policy already attached.
386
- * `gkehub.ScopeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the scope are preserved.
387
- * `gkehub.ScopeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the scope are preserved.
388
-
389
- A data source can be used to retrieve policy data in advent you do not need creation
390
-
391
- * `gkehub.ScopeIamPolicy`: Retrieves the IAM policy for the scope
392
-
393
- > **Note:** `gkehub.ScopeIamPolicy` **cannot** be used in conjunction with `gkehub.ScopeIamBinding` and `gkehub.ScopeIamMember` or they will fight over what your policy should be.
394
-
395
- > **Note:** `gkehub.ScopeIamBinding` resources **can be** used in conjunction with `gkehub.ScopeIamMember` resources **only if** they do not grant privilege to the same role.
396
-
397
359
  ## gkehub.ScopeIamPolicy
398
360
 
399
361
  ```python
@@ -322,26 +322,6 @@ class ConsentStoreIamBinding(pulumi.CustomResource):
322
322
  member="user:jane@example.com")
323
323
  ```
324
324
 
325
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
326
-
327
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
328
- ---
329
-
330
- # IAM policy for Cloud Healthcare ConsentStore
331
- Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
332
-
333
- * `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
334
- * `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
335
- * `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
336
-
337
- A data source can be used to retrieve policy data in advent you do not need creation
338
-
339
- * `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
340
-
341
- > **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
342
-
343
- > **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
344
-
345
325
  ## healthcare.ConsentStoreIamPolicy
346
326
 
347
327
  ```python
@@ -502,26 +482,6 @@ class ConsentStoreIamBinding(pulumi.CustomResource):
502
482
  member="user:jane@example.com")
503
483
  ```
504
484
 
505
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
506
-
507
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
508
- ---
509
-
510
- # IAM policy for Cloud Healthcare ConsentStore
511
- Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
512
-
513
- * `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
514
- * `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
515
- * `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
516
-
517
- A data source can be used to retrieve policy data in advent you do not need creation
518
-
519
- * `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
520
-
521
- > **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
522
-
523
- > **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
524
-
525
485
  ## healthcare.ConsentStoreIamPolicy
526
486
 
527
487
  ```python
@@ -322,26 +322,6 @@ class ConsentStoreIamMember(pulumi.CustomResource):
322
322
  member="user:jane@example.com")
323
323
  ```
324
324
 
325
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
326
-
327
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
328
- ---
329
-
330
- # IAM policy for Cloud Healthcare ConsentStore
331
- Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
332
-
333
- * `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
334
- * `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
335
- * `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
336
-
337
- A data source can be used to retrieve policy data in advent you do not need creation
338
-
339
- * `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
340
-
341
- > **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
342
-
343
- > **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
344
-
345
325
  ## healthcare.ConsentStoreIamPolicy
346
326
 
347
327
  ```python
@@ -502,26 +482,6 @@ class ConsentStoreIamMember(pulumi.CustomResource):
502
482
  member="user:jane@example.com")
503
483
  ```
504
484
 
505
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
506
-
507
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
508
- ---
509
-
510
- # IAM policy for Cloud Healthcare ConsentStore
511
- Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
512
-
513
- * `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
514
- * `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
515
- * `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
516
-
517
- A data source can be used to retrieve policy data in advent you do not need creation
518
-
519
- * `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
520
-
521
- > **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
522
-
523
- > **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
524
-
525
485
  ## healthcare.ConsentStoreIamPolicy
526
486
 
527
487
  ```python
@@ -219,26 +219,6 @@ class ConsentStoreIamPolicy(pulumi.CustomResource):
219
219
  member="user:jane@example.com")
220
220
  ```
221
221
 
222
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
223
-
224
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
225
- ---
226
-
227
- # IAM policy for Cloud Healthcare ConsentStore
228
- Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
229
-
230
- * `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
231
- * `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
232
- * `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
233
-
234
- A data source can be used to retrieve policy data in advent you do not need creation
235
-
236
- * `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
237
-
238
- > **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
239
-
240
- > **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
241
-
242
222
  ## healthcare.ConsentStoreIamPolicy
243
223
 
244
224
  ```python
@@ -387,26 +367,6 @@ class ConsentStoreIamPolicy(pulumi.CustomResource):
387
367
  member="user:jane@example.com")
388
368
  ```
389
369
 
390
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
391
-
392
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
393
- ---
394
-
395
- # IAM policy for Cloud Healthcare ConsentStore
396
- Three different resources help you manage your IAM policy for Cloud Healthcare ConsentStore. Each of these resources serves a different use case:
397
-
398
- * `healthcare.ConsentStoreIamPolicy`: Authoritative. Sets the IAM policy for the consentstore and replaces any existing policy already attached.
399
- * `healthcare.ConsentStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the consentstore are preserved.
400
- * `healthcare.ConsentStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the consentstore are preserved.
401
-
402
- A data source can be used to retrieve policy data in advent you do not need creation
403
-
404
- * `healthcare.ConsentStoreIamPolicy`: Retrieves the IAM policy for the consentstore
405
-
406
- > **Note:** `healthcare.ConsentStoreIamPolicy` **cannot** be used in conjunction with `healthcare.ConsentStoreIamBinding` and `healthcare.ConsentStoreIamMember` or they will fight over what your policy should be.
407
-
408
- > **Note:** `healthcare.ConsentStoreIamBinding` resources **can be** used in conjunction with `healthcare.ConsentStoreIamMember` resources **only if** they do not grant privilege to the same role.
409
-
410
370
  ## healthcare.ConsentStoreIamPolicy
411
371
 
412
372
  ```python
@@ -275,6 +275,21 @@ class DatasetIamBinding(pulumi.CustomResource):
275
275
  member="user:jane@example.com")
276
276
  ```
277
277
 
278
+ ## healthcare.DatasetIamPolicy
279
+
280
+ ```python
281
+ import pulumi
282
+ import pulumi_gcp as gcp
283
+
284
+ admin = gcp.organizations.get_iam_policy(bindings=[{
285
+ "role": "roles/editor",
286
+ "members": ["user:jane@example.com"],
287
+ }])
288
+ dataset = gcp.healthcare.DatasetIamPolicy("dataset",
289
+ dataset_id="your-dataset-id",
290
+ policy_data=admin.policy_data)
291
+ ```
292
+
278
293
  ## healthcare.DatasetIamBinding
279
294
 
280
295
  ```python
@@ -399,6 +414,21 @@ class DatasetIamBinding(pulumi.CustomResource):
399
414
  member="user:jane@example.com")
400
415
  ```
401
416
 
417
+ ## healthcare.DatasetIamPolicy
418
+
419
+ ```python
420
+ import pulumi
421
+ import pulumi_gcp as gcp
422
+
423
+ admin = gcp.organizations.get_iam_policy(bindings=[{
424
+ "role": "roles/editor",
425
+ "members": ["user:jane@example.com"],
426
+ }])
427
+ dataset = gcp.healthcare.DatasetIamPolicy("dataset",
428
+ dataset_id="your-dataset-id",
429
+ policy_data=admin.policy_data)
430
+ ```
431
+
402
432
  ## healthcare.DatasetIamBinding
403
433
 
404
434
  ```python