pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -306,26 +306,6 @@ class EnvironmentIamBinding(pulumi.CustomResource):
306
306
  member="user:jane@example.com")
307
307
  ```
308
308
 
309
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
310
-
311
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
312
- ---
313
-
314
- # IAM policy for Apigee Environment
315
- Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
316
-
317
- * `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
318
- * `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
319
- * `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
320
-
321
- A data source can be used to retrieve policy data in advent you do not need creation
322
-
323
- * `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
324
-
325
- > **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
326
-
327
- > **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
328
-
329
309
  ## apigee.EnvironmentIamPolicy
330
310
 
331
311
  ```python
@@ -483,26 +463,6 @@ class EnvironmentIamBinding(pulumi.CustomResource):
483
463
  member="user:jane@example.com")
484
464
  ```
485
465
 
486
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
487
-
488
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
489
- ---
490
-
491
- # IAM policy for Apigee Environment
492
- Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
493
-
494
- * `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
495
- * `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
496
- * `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
497
-
498
- A data source can be used to retrieve policy data in advent you do not need creation
499
-
500
- * `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
501
-
502
- > **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
503
-
504
- > **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
505
-
506
466
  ## apigee.EnvironmentIamPolicy
507
467
 
508
468
  ```python
@@ -306,26 +306,6 @@ class EnvironmentIamMember(pulumi.CustomResource):
306
306
  member="user:jane@example.com")
307
307
  ```
308
308
 
309
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
310
-
311
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
312
- ---
313
-
314
- # IAM policy for Apigee Environment
315
- Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
316
-
317
- * `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
318
- * `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
319
- * `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
320
-
321
- A data source can be used to retrieve policy data in advent you do not need creation
322
-
323
- * `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
324
-
325
- > **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
326
-
327
- > **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
328
-
329
309
  ## apigee.EnvironmentIamPolicy
330
310
 
331
311
  ```python
@@ -483,26 +463,6 @@ class EnvironmentIamMember(pulumi.CustomResource):
483
463
  member="user:jane@example.com")
484
464
  ```
485
465
 
486
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
487
-
488
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
489
- ---
490
-
491
- # IAM policy for Apigee Environment
492
- Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
493
-
494
- * `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
495
- * `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
496
- * `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
497
-
498
- A data source can be used to retrieve policy data in advent you do not need creation
499
-
500
- * `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
501
-
502
- > **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
503
-
504
- > **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
505
-
506
466
  ## apigee.EnvironmentIamPolicy
507
467
 
508
468
  ```python
@@ -203,26 +203,6 @@ class EnvironmentIamPolicy(pulumi.CustomResource):
203
203
  member="user:jane@example.com")
204
204
  ```
205
205
 
206
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
207
-
208
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
209
- ---
210
-
211
- # IAM policy for Apigee Environment
212
- Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
213
-
214
- * `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
215
- * `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
216
- * `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
217
-
218
- A data source can be used to retrieve policy data in advent you do not need creation
219
-
220
- * `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
221
-
222
- > **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
223
-
224
- > **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
225
-
226
206
  ## apigee.EnvironmentIamPolicy
227
207
 
228
208
  ```python
@@ -368,26 +348,6 @@ class EnvironmentIamPolicy(pulumi.CustomResource):
368
348
  member="user:jane@example.com")
369
349
  ```
370
350
 
371
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
372
-
373
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
374
- ---
375
-
376
- # IAM policy for Apigee Environment
377
- Three different resources help you manage your IAM policy for Apigee Environment. Each of these resources serves a different use case:
378
-
379
- * `apigee.EnvironmentIamPolicy`: Authoritative. Sets the IAM policy for the environment and replaces any existing policy already attached.
380
- * `apigee.EnvironmentIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the environment are preserved.
381
- * `apigee.EnvironmentIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the environment are preserved.
382
-
383
- A data source can be used to retrieve policy data in advent you do not need creation
384
-
385
- * `apigee.EnvironmentIamPolicy`: Retrieves the IAM policy for the environment
386
-
387
- > **Note:** `apigee.EnvironmentIamPolicy` **cannot** be used in conjunction with `apigee.EnvironmentIamBinding` and `apigee.EnvironmentIamMember` or they will fight over what your policy should be.
388
-
389
- > **Note:** `apigee.EnvironmentIamBinding` resources **can be** used in conjunction with `apigee.EnvironmentIamMember` resources **only if** they do not grant privilege to the same role.
390
-
391
351
  ## apigee.EnvironmentIamPolicy
392
352
 
393
353
  ```python
@@ -367,25 +367,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
367
367
  member="user:jane@example.com")
368
368
  ```
369
369
 
370
- ## This resource supports User Project Overrides.
371
-
372
- -
373
-
374
- # IAM policy for Artifact Registry Repository
375
- Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
376
-
377
- * `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
378
- * `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
379
- * `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
380
-
381
- A data source can be used to retrieve policy data in advent you do not need creation
382
-
383
- * `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
384
-
385
- > **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
386
-
387
- > **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
388
-
389
370
  ## artifactregistry.RepositoryIamPolicy
390
371
 
391
372
  ```python
@@ -559,25 +540,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
559
540
  member="user:jane@example.com")
560
541
  ```
561
542
 
562
- ## This resource supports User Project Overrides.
563
-
564
- -
565
-
566
- # IAM policy for Artifact Registry Repository
567
- Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
568
-
569
- * `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
570
- * `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
571
- * `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
572
-
573
- A data source can be used to retrieve policy data in advent you do not need creation
574
-
575
- * `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
576
-
577
- > **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
578
-
579
- > **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
580
-
581
543
  ## artifactregistry.RepositoryIamPolicy
582
544
 
583
545
  ```python
@@ -367,25 +367,6 @@ class RepositoryIamMember(pulumi.CustomResource):
367
367
  member="user:jane@example.com")
368
368
  ```
369
369
 
370
- ## This resource supports User Project Overrides.
371
-
372
- -
373
-
374
- # IAM policy for Artifact Registry Repository
375
- Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
376
-
377
- * `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
378
- * `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
379
- * `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
380
-
381
- A data source can be used to retrieve policy data in advent you do not need creation
382
-
383
- * `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
384
-
385
- > **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
386
-
387
- > **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
388
-
389
370
  ## artifactregistry.RepositoryIamPolicy
390
371
 
391
372
  ```python
@@ -559,25 +540,6 @@ class RepositoryIamMember(pulumi.CustomResource):
559
540
  member="user:jane@example.com")
560
541
  ```
561
542
 
562
- ## This resource supports User Project Overrides.
563
-
564
- -
565
-
566
- # IAM policy for Artifact Registry Repository
567
- Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
568
-
569
- * `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
570
- * `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
571
- * `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
572
-
573
- A data source can be used to retrieve policy data in advent you do not need creation
574
-
575
- * `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
576
-
577
- > **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
578
-
579
- > **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
580
-
581
543
  ## artifactregistry.RepositoryIamPolicy
582
544
 
583
545
  ```python
@@ -264,25 +264,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
264
264
  member="user:jane@example.com")
265
265
  ```
266
266
 
267
- ## This resource supports User Project Overrides.
268
-
269
- -
270
-
271
- # IAM policy for Artifact Registry Repository
272
- Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
273
-
274
- * `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
275
- * `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
276
- * `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
277
-
278
- A data source can be used to retrieve policy data in advent you do not need creation
279
-
280
- * `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
281
-
282
- > **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
283
-
284
- > **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
285
-
286
267
  ## artifactregistry.RepositoryIamPolicy
287
268
 
288
269
  ```python
@@ -444,25 +425,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
444
425
  member="user:jane@example.com")
445
426
  ```
446
427
 
447
- ## This resource supports User Project Overrides.
448
-
449
- -
450
-
451
- # IAM policy for Artifact Registry Repository
452
- Three different resources help you manage your IAM policy for Artifact Registry Repository. Each of these resources serves a different use case:
453
-
454
- * `artifactregistry.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
455
- * `artifactregistry.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
456
- * `artifactregistry.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
457
-
458
- A data source can be used to retrieve policy data in advent you do not need creation
459
-
460
- * `artifactregistry.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
461
-
462
- > **Note:** `artifactregistry.RepositoryIamPolicy` **cannot** be used in conjunction with `artifactregistry.RepositoryIamBinding` and `artifactregistry.RepositoryIamMember` or they will fight over what your policy should be.
463
-
464
- > **Note:** `artifactregistry.RepositoryIamBinding` resources **can be** used in conjunction with `artifactregistry.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
465
-
466
428
  ## artifactregistry.RepositoryIamPolicy
467
429
 
468
430
  ```python
@@ -391,25 +391,6 @@ class ConnectionIamBinding(pulumi.CustomResource):
391
391
  member="user:jane@example.com")
392
392
  ```
393
393
 
394
- ## This resource supports User Project Overrides.
395
-
396
- -
397
-
398
- # IAM policy for BigQuery Connection Connection
399
- Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
400
-
401
- * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
402
- * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
403
- * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
404
-
405
- A data source can be used to retrieve policy data in advent you do not need creation
406
-
407
- * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
408
-
409
- > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
410
-
411
- > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
412
-
413
394
  ## bigquery.ConnectionIamPolicy
414
395
 
415
396
  ```python
@@ -589,25 +570,6 @@ class ConnectionIamBinding(pulumi.CustomResource):
589
570
  member="user:jane@example.com")
590
571
  ```
591
572
 
592
- ## This resource supports User Project Overrides.
593
-
594
- -
595
-
596
- # IAM policy for BigQuery Connection Connection
597
- Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
598
-
599
- * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
600
- * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
601
- * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
602
-
603
- A data source can be used to retrieve policy data in advent you do not need creation
604
-
605
- * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
606
-
607
- > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
608
-
609
- > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
610
-
611
573
  ## bigquery.ConnectionIamPolicy
612
574
 
613
575
  ```python
@@ -391,25 +391,6 @@ class ConnectionIamMember(pulumi.CustomResource):
391
391
  member="user:jane@example.com")
392
392
  ```
393
393
 
394
- ## This resource supports User Project Overrides.
395
-
396
- -
397
-
398
- # IAM policy for BigQuery Connection Connection
399
- Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
400
-
401
- * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
402
- * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
403
- * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
404
-
405
- A data source can be used to retrieve policy data in advent you do not need creation
406
-
407
- * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
408
-
409
- > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
410
-
411
- > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
412
-
413
394
  ## bigquery.ConnectionIamPolicy
414
395
 
415
396
  ```python
@@ -589,25 +570,6 @@ class ConnectionIamMember(pulumi.CustomResource):
589
570
  member="user:jane@example.com")
590
571
  ```
591
572
 
592
- ## This resource supports User Project Overrides.
593
-
594
- -
595
-
596
- # IAM policy for BigQuery Connection Connection
597
- Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
598
-
599
- * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
600
- * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
601
- * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
602
-
603
- A data source can be used to retrieve policy data in advent you do not need creation
604
-
605
- * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
606
-
607
- > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
608
-
609
- > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
610
-
611
573
  ## bigquery.ConnectionIamPolicy
612
574
 
613
575
  ```python
@@ -288,25 +288,6 @@ class ConnectionIamPolicy(pulumi.CustomResource):
288
288
  member="user:jane@example.com")
289
289
  ```
290
290
 
291
- ## This resource supports User Project Overrides.
292
-
293
- -
294
-
295
- # IAM policy for BigQuery Connection Connection
296
- Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
297
-
298
- * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
299
- * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
300
- * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
301
-
302
- A data source can be used to retrieve policy data in advent you do not need creation
303
-
304
- * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
305
-
306
- > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
307
-
308
- > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
309
-
310
291
  ## bigquery.ConnectionIamPolicy
311
292
 
312
293
  ```python
@@ -474,25 +455,6 @@ class ConnectionIamPolicy(pulumi.CustomResource):
474
455
  member="user:jane@example.com")
475
456
  ```
476
457
 
477
- ## This resource supports User Project Overrides.
478
-
479
- -
480
-
481
- # IAM policy for BigQuery Connection Connection
482
- Three different resources help you manage your IAM policy for BigQuery Connection Connection. Each of these resources serves a different use case:
483
-
484
- * `bigquery.ConnectionIamPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
485
- * `bigquery.ConnectionIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
486
- * `bigquery.ConnectionIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
487
-
488
- A data source can be used to retrieve policy data in advent you do not need creation
489
-
490
- * `bigquery.ConnectionIamPolicy`: Retrieves the IAM policy for the connection
491
-
492
- > **Note:** `bigquery.ConnectionIamPolicy` **cannot** be used in conjunction with `bigquery.ConnectionIamBinding` and `bigquery.ConnectionIamMember` or they will fight over what your policy should be.
493
-
494
- > **Note:** `bigquery.ConnectionIamBinding` resources **can be** used in conjunction with `bigquery.ConnectionIamMember` resources **only if** they do not grant privilege to the same role.
495
-
496
458
  ## bigquery.ConnectionIamPolicy
497
459
 
498
460
  ```python
@@ -315,6 +315,22 @@ class DatasetIamBinding(pulumi.CustomResource):
315
315
  member="user:jane@example.com")
316
316
  ```
317
317
 
318
+ ## bigquery.DatasetIamPolicy
319
+
320
+ ```python
321
+ import pulumi
322
+ import pulumi_gcp as gcp
323
+
324
+ owner = gcp.organizations.get_iam_policy(bindings=[{
325
+ "role": "roles/bigquery.dataOwner",
326
+ "members": ["user:jane@example.com"],
327
+ }])
328
+ dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
329
+ dataset = gcp.bigquery.DatasetIamPolicy("dataset",
330
+ dataset_id=dataset_dataset.dataset_id,
331
+ policy_data=owner.policy_data)
332
+ ```
333
+
318
334
  ## bigquery.DatasetIamBinding
319
335
 
320
336
  ```python
@@ -452,6 +468,22 @@ class DatasetIamBinding(pulumi.CustomResource):
452
468
  member="user:jane@example.com")
453
469
  ```
454
470
 
471
+ ## bigquery.DatasetIamPolicy
472
+
473
+ ```python
474
+ import pulumi
475
+ import pulumi_gcp as gcp
476
+
477
+ owner = gcp.organizations.get_iam_policy(bindings=[{
478
+ "role": "roles/bigquery.dataOwner",
479
+ "members": ["user:jane@example.com"],
480
+ }])
481
+ dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
482
+ dataset = gcp.bigquery.DatasetIamPolicy("dataset",
483
+ dataset_id=dataset_dataset.dataset_id,
484
+ policy_data=owner.policy_data)
485
+ ```
486
+
455
487
  ## bigquery.DatasetIamBinding
456
488
 
457
489
  ```python
@@ -315,6 +315,22 @@ class DatasetIamMember(pulumi.CustomResource):
315
315
  member="user:jane@example.com")
316
316
  ```
317
317
 
318
+ ## bigquery.DatasetIamPolicy
319
+
320
+ ```python
321
+ import pulumi
322
+ import pulumi_gcp as gcp
323
+
324
+ owner = gcp.organizations.get_iam_policy(bindings=[{
325
+ "role": "roles/bigquery.dataOwner",
326
+ "members": ["user:jane@example.com"],
327
+ }])
328
+ dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
329
+ dataset = gcp.bigquery.DatasetIamPolicy("dataset",
330
+ dataset_id=dataset_dataset.dataset_id,
331
+ policy_data=owner.policy_data)
332
+ ```
333
+
318
334
  ## bigquery.DatasetIamBinding
319
335
 
320
336
  ```python
@@ -452,6 +468,22 @@ class DatasetIamMember(pulumi.CustomResource):
452
468
  member="user:jane@example.com")
453
469
  ```
454
470
 
471
+ ## bigquery.DatasetIamPolicy
472
+
473
+ ```python
474
+ import pulumi
475
+ import pulumi_gcp as gcp
476
+
477
+ owner = gcp.organizations.get_iam_policy(bindings=[{
478
+ "role": "roles/bigquery.dataOwner",
479
+ "members": ["user:jane@example.com"],
480
+ }])
481
+ dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
482
+ dataset = gcp.bigquery.DatasetIamPolicy("dataset",
483
+ dataset_id=dataset_dataset.dataset_id,
484
+ policy_data=owner.policy_data)
485
+ ```
486
+
455
487
  ## bigquery.DatasetIamBinding
456
488
 
457
489
  ```python
@@ -220,6 +220,22 @@ class DatasetIamPolicy(pulumi.CustomResource):
220
220
  member="user:jane@example.com")
221
221
  ```
222
222
 
223
+ ## bigquery.DatasetIamPolicy
224
+
225
+ ```python
226
+ import pulumi
227
+ import pulumi_gcp as gcp
228
+
229
+ owner = gcp.organizations.get_iam_policy(bindings=[{
230
+ "role": "roles/bigquery.dataOwner",
231
+ "members": ["user:jane@example.com"],
232
+ }])
233
+ dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
234
+ dataset = gcp.bigquery.DatasetIamPolicy("dataset",
235
+ dataset_id=dataset_dataset.dataset_id,
236
+ policy_data=owner.policy_data)
237
+ ```
238
+
223
239
  ## bigquery.DatasetIamBinding
224
240
 
225
241
  ```python
@@ -347,6 +363,22 @@ class DatasetIamPolicy(pulumi.CustomResource):
347
363
  member="user:jane@example.com")
348
364
  ```
349
365
 
366
+ ## bigquery.DatasetIamPolicy
367
+
368
+ ```python
369
+ import pulumi
370
+ import pulumi_gcp as gcp
371
+
372
+ owner = gcp.organizations.get_iam_policy(bindings=[{
373
+ "role": "roles/bigquery.dataOwner",
374
+ "members": ["user:jane@example.com"],
375
+ }])
376
+ dataset_dataset = gcp.bigquery.Dataset("dataset", dataset_id="example_dataset")
377
+ dataset = gcp.bigquery.DatasetIamPolicy("dataset",
378
+ dataset_id=dataset_dataset.dataset_id,
379
+ policy_data=owner.policy_data)
380
+ ```
381
+
350
382
  ## bigquery.DatasetIamBinding
351
383
 
352
384
  ```python