pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -363,25 +363,6 @@ class InstanceIamMember(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
- ## This resource supports User Project Overrides.
367
-
368
- -
369
-
370
- # IAM policy for Cloud AI Notebooks Instance
371
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
372
-
373
- * `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
374
- * `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
375
- * `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
376
-
377
- A data source can be used to retrieve policy data in advent you do not need creation
378
-
379
- * `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
380
-
381
- > **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
382
-
383
- > **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
384
-
385
366
  ## notebooks.InstanceIamPolicy
386
367
 
387
368
  ```python
@@ -554,25 +535,6 @@ class InstanceIamMember(pulumi.CustomResource):
554
535
  member="user:jane@example.com")
555
536
  ```
556
537
 
557
- ## This resource supports User Project Overrides.
558
-
559
- -
560
-
561
- # IAM policy for Cloud AI Notebooks Instance
562
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
563
-
564
- * `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
565
- * `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
566
- * `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
567
-
568
- A data source can be used to retrieve policy data in advent you do not need creation
569
-
570
- * `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
571
-
572
- > **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
573
-
574
- > **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
575
-
576
538
  ## notebooks.InstanceIamPolicy
577
539
 
578
540
  ```python
@@ -260,25 +260,6 @@ class InstanceIamPolicy(pulumi.CustomResource):
260
260
  member="user:jane@example.com")
261
261
  ```
262
262
 
263
- ## This resource supports User Project Overrides.
264
-
265
- -
266
-
267
- # IAM policy for Cloud AI Notebooks Instance
268
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
269
-
270
- * `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
271
- * `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
272
- * `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
273
-
274
- A data source can be used to retrieve policy data in advent you do not need creation
275
-
276
- * `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
277
-
278
- > **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
279
-
280
- > **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
281
-
282
263
  ## notebooks.InstanceIamPolicy
283
264
 
284
265
  ```python
@@ -439,25 +420,6 @@ class InstanceIamPolicy(pulumi.CustomResource):
439
420
  member="user:jane@example.com")
440
421
  ```
441
422
 
442
- ## This resource supports User Project Overrides.
443
-
444
- -
445
-
446
- # IAM policy for Cloud AI Notebooks Instance
447
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
448
-
449
- * `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
450
- * `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
451
- * `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
452
-
453
- A data source can be used to retrieve policy data in advent you do not need creation
454
-
455
- * `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
456
-
457
- > **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
458
-
459
- > **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
460
-
461
423
  ## notebooks.InstanceIamPolicy
462
424
 
463
425
  ```python
@@ -363,25 +363,6 @@ class RuntimeIamBinding(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
- ## This resource supports User Project Overrides.
367
-
368
- -
369
-
370
- # IAM policy for Cloud AI Notebooks Runtime
371
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
372
-
373
- * `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
374
- * `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
375
- * `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
376
-
377
- A data source can be used to retrieve policy data in advent you do not need creation
378
-
379
- * `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
380
-
381
- > **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
382
-
383
- > **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
384
-
385
366
  ## notebooks.RuntimeIamPolicy
386
367
 
387
368
  ```python
@@ -554,25 +535,6 @@ class RuntimeIamBinding(pulumi.CustomResource):
554
535
  member="user:jane@example.com")
555
536
  ```
556
537
 
557
- ## This resource supports User Project Overrides.
558
-
559
- -
560
-
561
- # IAM policy for Cloud AI Notebooks Runtime
562
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
563
-
564
- * `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
565
- * `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
566
- * `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
567
-
568
- A data source can be used to retrieve policy data in advent you do not need creation
569
-
570
- * `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
571
-
572
- > **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
573
-
574
- > **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
575
-
576
538
  ## notebooks.RuntimeIamPolicy
577
539
 
578
540
  ```python
@@ -363,25 +363,6 @@ class RuntimeIamMember(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
- ## This resource supports User Project Overrides.
367
-
368
- -
369
-
370
- # IAM policy for Cloud AI Notebooks Runtime
371
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
372
-
373
- * `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
374
- * `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
375
- * `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
376
-
377
- A data source can be used to retrieve policy data in advent you do not need creation
378
-
379
- * `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
380
-
381
- > **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
382
-
383
- > **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
384
-
385
366
  ## notebooks.RuntimeIamPolicy
386
367
 
387
368
  ```python
@@ -554,25 +535,6 @@ class RuntimeIamMember(pulumi.CustomResource):
554
535
  member="user:jane@example.com")
555
536
  ```
556
537
 
557
- ## This resource supports User Project Overrides.
558
-
559
- -
560
-
561
- # IAM policy for Cloud AI Notebooks Runtime
562
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
563
-
564
- * `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
565
- * `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
566
- * `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
567
-
568
- A data source can be used to retrieve policy data in advent you do not need creation
569
-
570
- * `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
571
-
572
- > **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
573
-
574
- > **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
575
-
576
538
  ## notebooks.RuntimeIamPolicy
577
539
 
578
540
  ```python
@@ -260,25 +260,6 @@ class RuntimeIamPolicy(pulumi.CustomResource):
260
260
  member="user:jane@example.com")
261
261
  ```
262
262
 
263
- ## This resource supports User Project Overrides.
264
-
265
- -
266
-
267
- # IAM policy for Cloud AI Notebooks Runtime
268
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
269
-
270
- * `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
271
- * `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
272
- * `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
273
-
274
- A data source can be used to retrieve policy data in advent you do not need creation
275
-
276
- * `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
277
-
278
- > **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
279
-
280
- > **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
281
-
282
263
  ## notebooks.RuntimeIamPolicy
283
264
 
284
265
  ```python
@@ -439,25 +420,6 @@ class RuntimeIamPolicy(pulumi.CustomResource):
439
420
  member="user:jane@example.com")
440
421
  ```
441
422
 
442
- ## This resource supports User Project Overrides.
443
-
444
- -
445
-
446
- # IAM policy for Cloud AI Notebooks Runtime
447
- Three different resources help you manage your IAM policy for Cloud AI Notebooks Runtime. Each of these resources serves a different use case:
448
-
449
- * `notebooks.RuntimeIamPolicy`: Authoritative. Sets the IAM policy for the runtime and replaces any existing policy already attached.
450
- * `notebooks.RuntimeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the runtime are preserved.
451
- * `notebooks.RuntimeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the runtime are preserved.
452
-
453
- A data source can be used to retrieve policy data in advent you do not need creation
454
-
455
- * `notebooks.RuntimeIamPolicy`: Retrieves the IAM policy for the runtime
456
-
457
- > **Note:** `notebooks.RuntimeIamPolicy` **cannot** be used in conjunction with `notebooks.RuntimeIamBinding` and `notebooks.RuntimeIamMember` or they will fight over what your policy should be.
458
-
459
- > **Note:** `notebooks.RuntimeIamBinding` resources **can be** used in conjunction with `notebooks.RuntimeIamMember` resources **only if** they do not grant privilege to the same role.
460
-
461
423
  ## notebooks.RuntimeIamPolicy
462
424
 
463
425
  ```python
@@ -356,6 +356,53 @@ class IAMMember(pulumi.CustomResource):
356
356
  ])
357
357
  ```
358
358
 
359
+ ## organizations.IAMPolicy
360
+
361
+ !> **Warning:** New organizations have several default policies which will,
362
+ without extreme caution, be **overwritten** by use of this resource.
363
+ The safest alternative is to use multiple `organizations.IAMBinding`
364
+ resources. This resource makes it easy to remove your own access to
365
+ an organization, which will require a call to Google Support to have
366
+ fixed, and can take multiple days to resolve.
367
+
368
+ In general, this resource should only be used with organizations
369
+ fully managed by this provider.I f you do use this resource,
370
+ the best way to be sure that you are not making dangerous changes is to start
371
+ by **importing** your existing policy, and examining the diff very closely.
372
+
373
+ ```python
374
+ import pulumi
375
+ import pulumi_gcp as gcp
376
+
377
+ admin = gcp.organizations.get_iam_policy(bindings=[{
378
+ "role": "roles/editor",
379
+ "members": ["user:jane@example.com"],
380
+ }])
381
+ organization = gcp.organizations.IAMPolicy("organization",
382
+ org_id="1234567890",
383
+ policy_data=admin.policy_data)
384
+ ```
385
+
386
+ With IAM Conditions:
387
+
388
+ ```python
389
+ import pulumi
390
+ import pulumi_gcp as gcp
391
+
392
+ admin = gcp.organizations.get_iam_policy(bindings=[{
393
+ "role": "roles/editor",
394
+ "members": ["user:jane@example.com"],
395
+ "condition": {
396
+ "title": "expires_after_2019_12_31",
397
+ "description": "Expiring at midnight of 2019-12-31",
398
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
399
+ },
400
+ }])
401
+ organization = gcp.organizations.IAMPolicy("organization",
402
+ org_id="1234567890",
403
+ policy_data=admin.policy_data)
404
+ ```
405
+
359
406
  ## organizations.IAMBinding
360
407
 
361
408
  > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
@@ -622,6 +669,53 @@ class IAMMember(pulumi.CustomResource):
622
669
  ])
623
670
  ```
624
671
 
672
+ ## organizations.IAMPolicy
673
+
674
+ !> **Warning:** New organizations have several default policies which will,
675
+ without extreme caution, be **overwritten** by use of this resource.
676
+ The safest alternative is to use multiple `organizations.IAMBinding`
677
+ resources. This resource makes it easy to remove your own access to
678
+ an organization, which will require a call to Google Support to have
679
+ fixed, and can take multiple days to resolve.
680
+
681
+ In general, this resource should only be used with organizations
682
+ fully managed by this provider.I f you do use this resource,
683
+ the best way to be sure that you are not making dangerous changes is to start
684
+ by **importing** your existing policy, and examining the diff very closely.
685
+
686
+ ```python
687
+ import pulumi
688
+ import pulumi_gcp as gcp
689
+
690
+ admin = gcp.organizations.get_iam_policy(bindings=[{
691
+ "role": "roles/editor",
692
+ "members": ["user:jane@example.com"],
693
+ }])
694
+ organization = gcp.organizations.IAMPolicy("organization",
695
+ org_id="1234567890",
696
+ policy_data=admin.policy_data)
697
+ ```
698
+
699
+ With IAM Conditions:
700
+
701
+ ```python
702
+ import pulumi
703
+ import pulumi_gcp as gcp
704
+
705
+ admin = gcp.organizations.get_iam_policy(bindings=[{
706
+ "role": "roles/editor",
707
+ "members": ["user:jane@example.com"],
708
+ "condition": {
709
+ "title": "expires_after_2019_12_31",
710
+ "description": "Expiring at midnight of 2019-12-31",
711
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
712
+ },
713
+ }])
714
+ organization = gcp.organizations.IAMPolicy("organization",
715
+ org_id="1234567890",
716
+ policy_data=admin.policy_data)
717
+ ```
718
+
625
719
  ## organizations.IAMBinding
626
720
 
627
721
  > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
@@ -285,6 +285,53 @@ class IAMPolicy(pulumi.CustomResource):
285
285
  ])
286
286
  ```
287
287
 
288
+ ## organizations.IAMPolicy
289
+
290
+ !> **Warning:** New organizations have several default policies which will,
291
+ without extreme caution, be **overwritten** by use of this resource.
292
+ The safest alternative is to use multiple `organizations.IAMBinding`
293
+ resources. This resource makes it easy to remove your own access to
294
+ an organization, which will require a call to Google Support to have
295
+ fixed, and can take multiple days to resolve.
296
+
297
+ In general, this resource should only be used with organizations
298
+ fully managed by this provider.I f you do use this resource,
299
+ the best way to be sure that you are not making dangerous changes is to start
300
+ by **importing** your existing policy, and examining the diff very closely.
301
+
302
+ ```python
303
+ import pulumi
304
+ import pulumi_gcp as gcp
305
+
306
+ admin = gcp.organizations.get_iam_policy(bindings=[{
307
+ "role": "roles/editor",
308
+ "members": ["user:jane@example.com"],
309
+ }])
310
+ organization = gcp.organizations.IAMPolicy("organization",
311
+ org_id="1234567890",
312
+ policy_data=admin.policy_data)
313
+ ```
314
+
315
+ With IAM Conditions:
316
+
317
+ ```python
318
+ import pulumi
319
+ import pulumi_gcp as gcp
320
+
321
+ admin = gcp.organizations.get_iam_policy(bindings=[{
322
+ "role": "roles/editor",
323
+ "members": ["user:jane@example.com"],
324
+ "condition": {
325
+ "title": "expires_after_2019_12_31",
326
+ "description": "Expiring at midnight of 2019-12-31",
327
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
328
+ },
329
+ }])
330
+ organization = gcp.organizations.IAMPolicy("organization",
331
+ org_id="1234567890",
332
+ policy_data=admin.policy_data)
333
+ ```
334
+
288
335
  ## organizations.IAMBinding
289
336
 
290
337
  > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
@@ -548,6 +595,53 @@ class IAMPolicy(pulumi.CustomResource):
548
595
  ])
549
596
  ```
550
597
 
598
+ ## organizations.IAMPolicy
599
+
600
+ !> **Warning:** New organizations have several default policies which will,
601
+ without extreme caution, be **overwritten** by use of this resource.
602
+ The safest alternative is to use multiple `organizations.IAMBinding`
603
+ resources. This resource makes it easy to remove your own access to
604
+ an organization, which will require a call to Google Support to have
605
+ fixed, and can take multiple days to resolve.
606
+
607
+ In general, this resource should only be used with organizations
608
+ fully managed by this provider.I f you do use this resource,
609
+ the best way to be sure that you are not making dangerous changes is to start
610
+ by **importing** your existing policy, and examining the diff very closely.
611
+
612
+ ```python
613
+ import pulumi
614
+ import pulumi_gcp as gcp
615
+
616
+ admin = gcp.organizations.get_iam_policy(bindings=[{
617
+ "role": "roles/editor",
618
+ "members": ["user:jane@example.com"],
619
+ }])
620
+ organization = gcp.organizations.IAMPolicy("organization",
621
+ org_id="1234567890",
622
+ policy_data=admin.policy_data)
623
+ ```
624
+
625
+ With IAM Conditions:
626
+
627
+ ```python
628
+ import pulumi
629
+ import pulumi_gcp as gcp
630
+
631
+ admin = gcp.organizations.get_iam_policy(bindings=[{
632
+ "role": "roles/editor",
633
+ "members": ["user:jane@example.com"],
634
+ "condition": {
635
+ "title": "expires_after_2019_12_31",
636
+ "description": "Expiring at midnight of 2019-12-31",
637
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
638
+ },
639
+ }])
640
+ organization = gcp.organizations.IAMPolicy("organization",
641
+ org_id="1234567890",
642
+ policy_data=admin.policy_data)
643
+ ```
644
+
551
645
  ## organizations.IAMBinding
552
646
 
553
647
  > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
@@ -319,25 +319,6 @@ class SchemaIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
- ## This resource supports User Project Overrides.
323
-
324
- -
325
-
326
- # IAM policy for Cloud Pub/Sub Schema
327
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
328
-
329
- * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
330
- * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
331
- * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
332
-
333
- A data source can be used to retrieve policy data in advent you do not need creation
334
-
335
- * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
336
-
337
- > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
338
-
339
- > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
340
-
341
322
  ## pubsub.SchemaIamPolicy
342
323
 
343
324
  ```python
@@ -499,25 +480,6 @@ class SchemaIamBinding(pulumi.CustomResource):
499
480
  member="user:jane@example.com")
500
481
  ```
501
482
 
502
- ## This resource supports User Project Overrides.
503
-
504
- -
505
-
506
- # IAM policy for Cloud Pub/Sub Schema
507
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
508
-
509
- * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
510
- * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
511
- * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
512
-
513
- A data source can be used to retrieve policy data in advent you do not need creation
514
-
515
- * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
516
-
517
- > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
518
-
519
- > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
520
-
521
483
  ## pubsub.SchemaIamPolicy
522
484
 
523
485
  ```python
@@ -319,25 +319,6 @@ class SchemaIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
- ## This resource supports User Project Overrides.
323
-
324
- -
325
-
326
- # IAM policy for Cloud Pub/Sub Schema
327
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
328
-
329
- * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
330
- * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
331
- * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
332
-
333
- A data source can be used to retrieve policy data in advent you do not need creation
334
-
335
- * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
336
-
337
- > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
338
-
339
- > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
340
-
341
322
  ## pubsub.SchemaIamPolicy
342
323
 
343
324
  ```python
@@ -499,25 +480,6 @@ class SchemaIamMember(pulumi.CustomResource):
499
480
  member="user:jane@example.com")
500
481
  ```
501
482
 
502
- ## This resource supports User Project Overrides.
503
-
504
- -
505
-
506
- # IAM policy for Cloud Pub/Sub Schema
507
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
508
-
509
- * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
510
- * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
511
- * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
512
-
513
- A data source can be used to retrieve policy data in advent you do not need creation
514
-
515
- * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
516
-
517
- > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
518
-
519
- > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
520
-
521
483
  ## pubsub.SchemaIamPolicy
522
484
 
523
485
  ```python
@@ -216,25 +216,6 @@ class SchemaIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
- ## This resource supports User Project Overrides.
220
-
221
- -
222
-
223
- # IAM policy for Cloud Pub/Sub Schema
224
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
225
-
226
- * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
227
- * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
228
- * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
229
-
230
- A data source can be used to retrieve policy data in advent you do not need creation
231
-
232
- * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
233
-
234
- > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
235
-
236
- > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
237
-
238
219
  ## pubsub.SchemaIamPolicy
239
220
 
240
221
  ```python
@@ -384,25 +365,6 @@ class SchemaIamPolicy(pulumi.CustomResource):
384
365
  member="user:jane@example.com")
385
366
  ```
386
367
 
387
- ## This resource supports User Project Overrides.
388
-
389
- -
390
-
391
- # IAM policy for Cloud Pub/Sub Schema
392
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Schema. Each of these resources serves a different use case:
393
-
394
- * `pubsub.SchemaIamPolicy`: Authoritative. Sets the IAM policy for the schema and replaces any existing policy already attached.
395
- * `pubsub.SchemaIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the schema are preserved.
396
- * `pubsub.SchemaIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the schema are preserved.
397
-
398
- A data source can be used to retrieve policy data in advent you do not need creation
399
-
400
- * `pubsub.SchemaIamPolicy`: Retrieves the IAM policy for the schema
401
-
402
- > **Note:** `pubsub.SchemaIamPolicy` **cannot** be used in conjunction with `pubsub.SchemaIamBinding` and `pubsub.SchemaIamMember` or they will fight over what your policy should be.
403
-
404
- > **Note:** `pubsub.SchemaIamBinding` resources **can be** used in conjunction with `pubsub.SchemaIamMember` resources **only if** they do not grant privilege to the same role.
405
-
406
368
  ## pubsub.SchemaIamPolicy
407
369
 
408
370
  ```python