pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -464,27 +464,6 @@ class AppEngineVersionIamBinding(pulumi.CustomResource):
464
464
  })
465
465
  ```
466
466
 
467
- ## This resource supports User Project Overrides.
468
-
469
- -
470
-
471
- # IAM policy for Identity-Aware Proxy AppEngineVersion
472
- Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
473
-
474
- * `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
475
- * `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
476
- * `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
477
-
478
- A data source can be used to retrieve policy data in advent you do not need creation
479
-
480
- * `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
481
-
482
- > **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
483
-
484
- > **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
485
-
486
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
487
-
488
467
  ## iap.AppEngineVersionIamPolicy
489
468
 
490
469
  ```python
@@ -788,27 +767,6 @@ class AppEngineVersionIamBinding(pulumi.CustomResource):
788
767
  })
789
768
  ```
790
769
 
791
- ## This resource supports User Project Overrides.
792
-
793
- -
794
-
795
- # IAM policy for Identity-Aware Proxy AppEngineVersion
796
- Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
797
-
798
- * `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
799
- * `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
800
- * `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
801
-
802
- A data source can be used to retrieve policy data in advent you do not need creation
803
-
804
- * `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
805
-
806
- > **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
807
-
808
- > **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
809
-
810
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
811
-
812
770
  ## iap.AppEngineVersionIamPolicy
813
771
 
814
772
  ```python
@@ -464,27 +464,6 @@ class AppEngineVersionIamMember(pulumi.CustomResource):
464
464
  })
465
465
  ```
466
466
 
467
- ## This resource supports User Project Overrides.
468
-
469
- -
470
-
471
- # IAM policy for Identity-Aware Proxy AppEngineVersion
472
- Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
473
-
474
- * `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
475
- * `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
476
- * `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
477
-
478
- A data source can be used to retrieve policy data in advent you do not need creation
479
-
480
- * `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
481
-
482
- > **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
483
-
484
- > **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
485
-
486
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
487
-
488
467
  ## iap.AppEngineVersionIamPolicy
489
468
 
490
469
  ```python
@@ -788,27 +767,6 @@ class AppEngineVersionIamMember(pulumi.CustomResource):
788
767
  })
789
768
  ```
790
769
 
791
- ## This resource supports User Project Overrides.
792
-
793
- -
794
-
795
- # IAM policy for Identity-Aware Proxy AppEngineVersion
796
- Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
797
-
798
- * `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
799
- * `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
800
- * `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
801
-
802
- A data source can be used to retrieve policy data in advent you do not need creation
803
-
804
- * `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
805
-
806
- > **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
807
-
808
- > **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
809
-
810
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
811
-
812
770
  ## iap.AppEngineVersionIamPolicy
813
771
 
814
772
  ```python
@@ -349,27 +349,6 @@ class AppEngineVersionIamPolicy(pulumi.CustomResource):
349
349
  })
350
350
  ```
351
351
 
352
- ## This resource supports User Project Overrides.
353
-
354
- -
355
-
356
- # IAM policy for Identity-Aware Proxy AppEngineVersion
357
- Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
358
-
359
- * `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
360
- * `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
361
- * `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
362
-
363
- A data source can be used to retrieve policy data in advent you do not need creation
364
-
365
- * `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
366
-
367
- > **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
368
-
369
- > **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
370
-
371
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
372
-
373
352
  ## iap.AppEngineVersionIamPolicy
374
353
 
375
354
  ```python
@@ -659,27 +638,6 @@ class AppEngineVersionIamPolicy(pulumi.CustomResource):
659
638
  })
660
639
  ```
661
640
 
662
- ## This resource supports User Project Overrides.
663
-
664
- -
665
-
666
- # IAM policy for Identity-Aware Proxy AppEngineVersion
667
- Three different resources help you manage your IAM policy for Identity-Aware Proxy AppEngineVersion. Each of these resources serves a different use case:
668
-
669
- * `iap.AppEngineVersionIamPolicy`: Authoritative. Sets the IAM policy for the appengineversion and replaces any existing policy already attached.
670
- * `iap.AppEngineVersionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the appengineversion are preserved.
671
- * `iap.AppEngineVersionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the appengineversion are preserved.
672
-
673
- A data source can be used to retrieve policy data in advent you do not need creation
674
-
675
- * `iap.AppEngineVersionIamPolicy`: Retrieves the IAM policy for the appengineversion
676
-
677
- > **Note:** `iap.AppEngineVersionIamPolicy` **cannot** be used in conjunction with `iap.AppEngineVersionIamBinding` and `iap.AppEngineVersionIamMember` or they will fight over what your policy should be.
678
-
679
- > **Note:** `iap.AppEngineVersionIamBinding` resources **can be** used in conjunction with `iap.AppEngineVersionIamMember` resources **only if** they do not grant privilege to the same role.
680
-
681
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
682
-
683
641
  ## iap.AppEngineVersionIamPolicy
684
642
 
685
643
  ```python
@@ -431,27 +431,6 @@ class TunnelDestGroupIamBinding(pulumi.CustomResource):
431
431
  })
432
432
  ```
433
433
 
434
- ## This resource supports User Project Overrides.
435
-
436
- -
437
-
438
- # IAM policy for Identity-Aware Proxy TunnelDestGroup
439
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
440
-
441
- * `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
442
- * `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
443
- * `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
444
-
445
- A data source can be used to retrieve policy data in advent you do not need creation
446
-
447
- * `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
448
-
449
- > **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
450
-
451
- > **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
452
-
453
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
454
-
455
434
  ## iap.TunnelDestGroupIamPolicy
456
435
 
457
436
  ```python
@@ -746,27 +725,6 @@ class TunnelDestGroupIamBinding(pulumi.CustomResource):
746
725
  })
747
726
  ```
748
727
 
749
- ## This resource supports User Project Overrides.
750
-
751
- -
752
-
753
- # IAM policy for Identity-Aware Proxy TunnelDestGroup
754
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
755
-
756
- * `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
757
- * `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
758
- * `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
759
-
760
- A data source can be used to retrieve policy data in advent you do not need creation
761
-
762
- * `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
763
-
764
- > **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
765
-
766
- > **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
767
-
768
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
769
-
770
728
  ## iap.TunnelDestGroupIamPolicy
771
729
 
772
730
  ```python
@@ -431,27 +431,6 @@ class TunnelDestGroupIamMember(pulumi.CustomResource):
431
431
  })
432
432
  ```
433
433
 
434
- ## This resource supports User Project Overrides.
435
-
436
- -
437
-
438
- # IAM policy for Identity-Aware Proxy TunnelDestGroup
439
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
440
-
441
- * `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
442
- * `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
443
- * `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
444
-
445
- A data source can be used to retrieve policy data in advent you do not need creation
446
-
447
- * `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
448
-
449
- > **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
450
-
451
- > **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
452
-
453
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
454
-
455
434
  ## iap.TunnelDestGroupIamPolicy
456
435
 
457
436
  ```python
@@ -746,27 +725,6 @@ class TunnelDestGroupIamMember(pulumi.CustomResource):
746
725
  })
747
726
  ```
748
727
 
749
- ## This resource supports User Project Overrides.
750
-
751
- -
752
-
753
- # IAM policy for Identity-Aware Proxy TunnelDestGroup
754
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
755
-
756
- * `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
757
- * `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
758
- * `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
759
-
760
- A data source can be used to retrieve policy data in advent you do not need creation
761
-
762
- * `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
763
-
764
- > **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
765
-
766
- > **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
767
-
768
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
769
-
770
728
  ## iap.TunnelDestGroupIamPolicy
771
729
 
772
730
  ```python
@@ -316,27 +316,6 @@ class TunnelDestGroupIamPolicy(pulumi.CustomResource):
316
316
  })
317
317
  ```
318
318
 
319
- ## This resource supports User Project Overrides.
320
-
321
- -
322
-
323
- # IAM policy for Identity-Aware Proxy TunnelDestGroup
324
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
325
-
326
- * `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
327
- * `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
328
- * `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
329
-
330
- A data source can be used to retrieve policy data in advent you do not need creation
331
-
332
- * `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
333
-
334
- > **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
335
-
336
- > **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
337
-
338
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
339
-
340
319
  ## iap.TunnelDestGroupIamPolicy
341
320
 
342
321
  ```python
@@ -617,27 +596,6 @@ class TunnelDestGroupIamPolicy(pulumi.CustomResource):
617
596
  })
618
597
  ```
619
598
 
620
- ## This resource supports User Project Overrides.
621
-
622
- -
623
-
624
- # IAM policy for Identity-Aware Proxy TunnelDestGroup
625
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelDestGroup. Each of these resources serves a different use case:
626
-
627
- * `iap.TunnelDestGroupIamPolicy`: Authoritative. Sets the IAM policy for the tunneldestgroup and replaces any existing policy already attached.
628
- * `iap.TunnelDestGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunneldestgroup are preserved.
629
- * `iap.TunnelDestGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunneldestgroup are preserved.
630
-
631
- A data source can be used to retrieve policy data in advent you do not need creation
632
-
633
- * `iap.TunnelDestGroupIamPolicy`: Retrieves the IAM policy for the tunneldestgroup
634
-
635
- > **Note:** `iap.TunnelDestGroupIamPolicy` **cannot** be used in conjunction with `iap.TunnelDestGroupIamBinding` and `iap.TunnelDestGroupIamMember` or they will fight over what your policy should be.
636
-
637
- > **Note:** `iap.TunnelDestGroupIamBinding` resources **can be** used in conjunction with `iap.TunnelDestGroupIamMember` resources **only if** they do not grant privilege to the same role.
638
-
639
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
640
-
641
599
  ## iap.TunnelDestGroupIamPolicy
642
600
 
643
601
  ```python
@@ -350,27 +350,6 @@ class TunnelIamBinding(pulumi.CustomResource):
350
350
  })
351
351
  ```
352
352
 
353
- ## This resource supports User Project Overrides.
354
-
355
- -
356
-
357
- # IAM policy for Identity-Aware Proxy Tunnel
358
- Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
359
-
360
- * `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
361
- * `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
362
- * `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
363
-
364
- A data source can be used to retrieve policy data in advent you do not need creation
365
-
366
- * `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
367
-
368
- > **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
369
-
370
- > **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
371
-
372
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
373
-
374
353
  ## iap.TunnelIamPolicy
375
354
 
376
355
  ```python
@@ -631,27 +610,6 @@ class TunnelIamBinding(pulumi.CustomResource):
631
610
  })
632
611
  ```
633
612
 
634
- ## This resource supports User Project Overrides.
635
-
636
- -
637
-
638
- # IAM policy for Identity-Aware Proxy Tunnel
639
- Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
640
-
641
- * `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
642
- * `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
643
- * `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
644
-
645
- A data source can be used to retrieve policy data in advent you do not need creation
646
-
647
- * `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
648
-
649
- > **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
650
-
651
- > **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
652
-
653
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
654
-
655
613
  ## iap.TunnelIamPolicy
656
614
 
657
615
  ```python
@@ -350,27 +350,6 @@ class TunnelIamMember(pulumi.CustomResource):
350
350
  })
351
351
  ```
352
352
 
353
- ## This resource supports User Project Overrides.
354
-
355
- -
356
-
357
- # IAM policy for Identity-Aware Proxy Tunnel
358
- Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
359
-
360
- * `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
361
- * `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
362
- * `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
363
-
364
- A data source can be used to retrieve policy data in advent you do not need creation
365
-
366
- * `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
367
-
368
- > **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
369
-
370
- > **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
371
-
372
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
373
-
374
353
  ## iap.TunnelIamPolicy
375
354
 
376
355
  ```python
@@ -631,27 +610,6 @@ class TunnelIamMember(pulumi.CustomResource):
631
610
  })
632
611
  ```
633
612
 
634
- ## This resource supports User Project Overrides.
635
-
636
- -
637
-
638
- # IAM policy for Identity-Aware Proxy Tunnel
639
- Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
640
-
641
- * `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
642
- * `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
643
- * `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
644
-
645
- A data source can be used to retrieve policy data in advent you do not need creation
646
-
647
- * `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
648
-
649
- > **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
650
-
651
- > **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
652
-
653
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
654
-
655
613
  ## iap.TunnelIamPolicy
656
614
 
657
615
  ```python
@@ -235,27 +235,6 @@ class TunnelIamPolicy(pulumi.CustomResource):
235
235
  })
236
236
  ```
237
237
 
238
- ## This resource supports User Project Overrides.
239
-
240
- -
241
-
242
- # IAM policy for Identity-Aware Proxy Tunnel
243
- Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
244
-
245
- * `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
246
- * `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
247
- * `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
248
-
249
- A data source can be used to retrieve policy data in advent you do not need creation
250
-
251
- * `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
252
-
253
- > **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
254
-
255
- > **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
256
-
257
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
258
-
259
238
  ## iap.TunnelIamPolicy
260
239
 
261
240
  ```python
@@ -502,27 +481,6 @@ class TunnelIamPolicy(pulumi.CustomResource):
502
481
  })
503
482
  ```
504
483
 
505
- ## This resource supports User Project Overrides.
506
-
507
- -
508
-
509
- # IAM policy for Identity-Aware Proxy Tunnel
510
- Three different resources help you manage your IAM policy for Identity-Aware Proxy Tunnel. Each of these resources serves a different use case:
511
-
512
- * `iap.TunnelIamPolicy`: Authoritative. Sets the IAM policy for the tunnel and replaces any existing policy already attached.
513
- * `iap.TunnelIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnel are preserved.
514
- * `iap.TunnelIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnel are preserved.
515
-
516
- A data source can be used to retrieve policy data in advent you do not need creation
517
-
518
- * `iap.TunnelIamPolicy`: Retrieves the IAM policy for the tunnel
519
-
520
- > **Note:** `iap.TunnelIamPolicy` **cannot** be used in conjunction with `iap.TunnelIamBinding` and `iap.TunnelIamMember` or they will fight over what your policy should be.
521
-
522
- > **Note:** `iap.TunnelIamBinding` resources **can be** used in conjunction with `iap.TunnelIamMember` resources **only if** they do not grant privilege to the same role.
523
-
524
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
525
-
526
484
  ## iap.TunnelIamPolicy
527
485
 
528
486
  ```python
@@ -419,27 +419,6 @@ class TunnelInstanceIAMBinding(pulumi.CustomResource):
419
419
  })
420
420
  ```
421
421
 
422
- ## This resource supports User Project Overrides.
423
-
424
- -
425
-
426
- # IAM policy for Identity-Aware Proxy TunnelInstance
427
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
428
-
429
- * `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
430
- * `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
431
- * `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
432
-
433
- A data source can be used to retrieve policy data in advent you do not need creation
434
-
435
- * `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
436
-
437
- > **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
438
-
439
- > **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
440
-
441
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
442
-
443
422
  ## iap.TunnelInstanceIAMPolicy
444
423
 
445
424
  ```python
@@ -731,27 +710,6 @@ class TunnelInstanceIAMBinding(pulumi.CustomResource):
731
710
  })
732
711
  ```
733
712
 
734
- ## This resource supports User Project Overrides.
735
-
736
- -
737
-
738
- # IAM policy for Identity-Aware Proxy TunnelInstance
739
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
740
-
741
- * `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
742
- * `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
743
- * `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
744
-
745
- A data source can be used to retrieve policy data in advent you do not need creation
746
-
747
- * `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
748
-
749
- > **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
750
-
751
- > **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
752
-
753
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
754
-
755
713
  ## iap.TunnelInstanceIAMPolicy
756
714
 
757
715
  ```python
@@ -419,27 +419,6 @@ class TunnelInstanceIAMMember(pulumi.CustomResource):
419
419
  })
420
420
  ```
421
421
 
422
- ## This resource supports User Project Overrides.
423
-
424
- -
425
-
426
- # IAM policy for Identity-Aware Proxy TunnelInstance
427
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
428
-
429
- * `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
430
- * `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
431
- * `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
432
-
433
- A data source can be used to retrieve policy data in advent you do not need creation
434
-
435
- * `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
436
-
437
- > **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
438
-
439
- > **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
440
-
441
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
442
-
443
422
  ## iap.TunnelInstanceIAMPolicy
444
423
 
445
424
  ```python
@@ -731,27 +710,6 @@ class TunnelInstanceIAMMember(pulumi.CustomResource):
731
710
  })
732
711
  ```
733
712
 
734
- ## This resource supports User Project Overrides.
735
-
736
- -
737
-
738
- # IAM policy for Identity-Aware Proxy TunnelInstance
739
- Three different resources help you manage your IAM policy for Identity-Aware Proxy TunnelInstance. Each of these resources serves a different use case:
740
-
741
- * `iap.TunnelInstanceIAMPolicy`: Authoritative. Sets the IAM policy for the tunnelinstance and replaces any existing policy already attached.
742
- * `iap.TunnelInstanceIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tunnelinstance are preserved.
743
- * `iap.TunnelInstanceIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tunnelinstance are preserved.
744
-
745
- A data source can be used to retrieve policy data in advent you do not need creation
746
-
747
- * `iap.TunnelInstanceIAMPolicy`: Retrieves the IAM policy for the tunnelinstance
748
-
749
- > **Note:** `iap.TunnelInstanceIAMPolicy` **cannot** be used in conjunction with `iap.TunnelInstanceIAMBinding` and `iap.TunnelInstanceIAMMember` or they will fight over what your policy should be.
750
-
751
- > **Note:** `iap.TunnelInstanceIAMBinding` resources **can be** used in conjunction with `iap.TunnelInstanceIAMMember` resources **only if** they do not grant privilege to the same role.
752
-
753
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
754
-
755
713
  ## iap.TunnelInstanceIAMPolicy
756
714
 
757
715
  ```python