pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -300,6 +300,21 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
300
300
  member="user:jane@example.com")
301
301
  ```
302
302
 
303
+ ## pubsub.SubscriptionIAMPolicy
304
+
305
+ ```python
306
+ import pulumi
307
+ import pulumi_gcp as gcp
308
+
309
+ admin = gcp.organizations.get_iam_policy(bindings=[{
310
+ "role": "roles/editor",
311
+ "members": ["user:jane@example.com"],
312
+ }])
313
+ editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
314
+ subscription="your-subscription-name",
315
+ policy_data=admin.policy_data)
316
+ ```
317
+
303
318
  ## pubsub.SubscriptionIAMBinding
304
319
 
305
320
  ```python
@@ -423,6 +438,21 @@ class SubscriptionIAMBinding(pulumi.CustomResource):
423
438
  member="user:jane@example.com")
424
439
  ```
425
440
 
441
+ ## pubsub.SubscriptionIAMPolicy
442
+
443
+ ```python
444
+ import pulumi
445
+ import pulumi_gcp as gcp
446
+
447
+ admin = gcp.organizations.get_iam_policy(bindings=[{
448
+ "role": "roles/editor",
449
+ "members": ["user:jane@example.com"],
450
+ }])
451
+ editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
452
+ subscription="your-subscription-name",
453
+ policy_data=admin.policy_data)
454
+ ```
455
+
426
456
  ## pubsub.SubscriptionIAMBinding
427
457
 
428
458
  ```python
@@ -300,6 +300,21 @@ class SubscriptionIAMMember(pulumi.CustomResource):
300
300
  member="user:jane@example.com")
301
301
  ```
302
302
 
303
+ ## pubsub.SubscriptionIAMPolicy
304
+
305
+ ```python
306
+ import pulumi
307
+ import pulumi_gcp as gcp
308
+
309
+ admin = gcp.organizations.get_iam_policy(bindings=[{
310
+ "role": "roles/editor",
311
+ "members": ["user:jane@example.com"],
312
+ }])
313
+ editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
314
+ subscription="your-subscription-name",
315
+ policy_data=admin.policy_data)
316
+ ```
317
+
303
318
  ## pubsub.SubscriptionIAMBinding
304
319
 
305
320
  ```python
@@ -423,6 +438,21 @@ class SubscriptionIAMMember(pulumi.CustomResource):
423
438
  member="user:jane@example.com")
424
439
  ```
425
440
 
441
+ ## pubsub.SubscriptionIAMPolicy
442
+
443
+ ```python
444
+ import pulumi
445
+ import pulumi_gcp as gcp
446
+
447
+ admin = gcp.organizations.get_iam_policy(bindings=[{
448
+ "role": "roles/editor",
449
+ "members": ["user:jane@example.com"],
450
+ }])
451
+ editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
452
+ subscription="your-subscription-name",
453
+ policy_data=admin.policy_data)
454
+ ```
455
+
426
456
  ## pubsub.SubscriptionIAMBinding
427
457
 
428
458
  ```python
@@ -217,6 +217,21 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
217
217
  member="user:jane@example.com")
218
218
  ```
219
219
 
220
+ ## pubsub.SubscriptionIAMPolicy
221
+
222
+ ```python
223
+ import pulumi
224
+ import pulumi_gcp as gcp
225
+
226
+ admin = gcp.organizations.get_iam_policy(bindings=[{
227
+ "role": "roles/editor",
228
+ "members": ["user:jane@example.com"],
229
+ }])
230
+ editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
231
+ subscription="your-subscription-name",
232
+ policy_data=admin.policy_data)
233
+ ```
234
+
220
235
  ## pubsub.SubscriptionIAMBinding
221
236
 
222
237
  ```python
@@ -333,6 +348,21 @@ class SubscriptionIAMPolicy(pulumi.CustomResource):
333
348
  member="user:jane@example.com")
334
349
  ```
335
350
 
351
+ ## pubsub.SubscriptionIAMPolicy
352
+
353
+ ```python
354
+ import pulumi
355
+ import pulumi_gcp as gcp
356
+
357
+ admin = gcp.organizations.get_iam_policy(bindings=[{
358
+ "role": "roles/editor",
359
+ "members": ["user:jane@example.com"],
360
+ }])
361
+ editor = gcp.pubsub.SubscriptionIAMPolicy("editor",
362
+ subscription="your-subscription-name",
363
+ policy_data=admin.policy_data)
364
+ ```
365
+
336
366
  ## pubsub.SubscriptionIAMBinding
337
367
 
338
368
  ```python
@@ -319,25 +319,6 @@ class TopicIAMBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
- ## This resource supports User Project Overrides.
323
-
324
- -
325
-
326
- # IAM policy for Cloud Pub/Sub Topic
327
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
328
-
329
- * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
330
- * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
331
- * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
332
-
333
- A data source can be used to retrieve policy data in advent you do not need creation
334
-
335
- * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
336
-
337
- > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
338
-
339
- > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
340
-
341
322
  ## pubsub.TopicIAMPolicy
342
323
 
343
324
  ```python
@@ -499,25 +480,6 @@ class TopicIAMBinding(pulumi.CustomResource):
499
480
  member="user:jane@example.com")
500
481
  ```
501
482
 
502
- ## This resource supports User Project Overrides.
503
-
504
- -
505
-
506
- # IAM policy for Cloud Pub/Sub Topic
507
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
508
-
509
- * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
510
- * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
511
- * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
512
-
513
- A data source can be used to retrieve policy data in advent you do not need creation
514
-
515
- * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
516
-
517
- > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
518
-
519
- > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
520
-
521
483
  ## pubsub.TopicIAMPolicy
522
484
 
523
485
  ```python
@@ -319,25 +319,6 @@ class TopicIAMMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
- ## This resource supports User Project Overrides.
323
-
324
- -
325
-
326
- # IAM policy for Cloud Pub/Sub Topic
327
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
328
-
329
- * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
330
- * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
331
- * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
332
-
333
- A data source can be used to retrieve policy data in advent you do not need creation
334
-
335
- * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
336
-
337
- > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
338
-
339
- > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
340
-
341
322
  ## pubsub.TopicIAMPolicy
342
323
 
343
324
  ```python
@@ -499,25 +480,6 @@ class TopicIAMMember(pulumi.CustomResource):
499
480
  member="user:jane@example.com")
500
481
  ```
501
482
 
502
- ## This resource supports User Project Overrides.
503
-
504
- -
505
-
506
- # IAM policy for Cloud Pub/Sub Topic
507
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
508
-
509
- * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
510
- * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
511
- * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
512
-
513
- A data source can be used to retrieve policy data in advent you do not need creation
514
-
515
- * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
516
-
517
- > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
518
-
519
- > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
520
-
521
483
  ## pubsub.TopicIAMPolicy
522
484
 
523
485
  ```python
@@ -216,25 +216,6 @@ class TopicIAMPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
- ## This resource supports User Project Overrides.
220
-
221
- -
222
-
223
- # IAM policy for Cloud Pub/Sub Topic
224
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
225
-
226
- * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
227
- * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
228
- * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
229
-
230
- A data source can be used to retrieve policy data in advent you do not need creation
231
-
232
- * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
233
-
234
- > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
235
-
236
- > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
237
-
238
219
  ## pubsub.TopicIAMPolicy
239
220
 
240
221
  ```python
@@ -384,25 +365,6 @@ class TopicIAMPolicy(pulumi.CustomResource):
384
365
  member="user:jane@example.com")
385
366
  ```
386
367
 
387
- ## This resource supports User Project Overrides.
388
-
389
- -
390
-
391
- # IAM policy for Cloud Pub/Sub Topic
392
- Three different resources help you manage your IAM policy for Cloud Pub/Sub Topic. Each of these resources serves a different use case:
393
-
394
- * `pubsub.TopicIAMPolicy`: Authoritative. Sets the IAM policy for the topic and replaces any existing policy already attached.
395
- * `pubsub.TopicIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the topic are preserved.
396
- * `pubsub.TopicIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the topic are preserved.
397
-
398
- A data source can be used to retrieve policy data in advent you do not need creation
399
-
400
- * `pubsub.TopicIAMPolicy`: Retrieves the IAM policy for the topic
401
-
402
- > **Note:** `pubsub.TopicIAMPolicy` **cannot** be used in conjunction with `pubsub.TopicIAMBinding` and `pubsub.TopicIAMMember` or they will fight over what your policy should be.
403
-
404
- > **Note:** `pubsub.TopicIAMBinding` resources **can be** used in conjunction with `pubsub.TopicIAMMember` resources **only if** they do not grant privilege to the same role.
405
-
406
368
  ## pubsub.TopicIAMPolicy
407
369
 
408
370
  ```python
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "gcp",
4
- "version": "7.36.0"
4
+ "version": "7.36.0-alpha.1723010828"
5
5
  }
@@ -380,27 +380,6 @@ class SecretIamBinding(pulumi.CustomResource):
380
380
  })
381
381
  ```
382
382
 
383
- ## This resource supports User Project Overrides.
384
-
385
- -
386
-
387
- # IAM policy for Secret Manager Secret
388
- Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
389
-
390
- * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
391
- * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
392
- * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
393
-
394
- A data source can be used to retrieve policy data in advent you do not need creation
395
-
396
- * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
397
-
398
- > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
399
-
400
- > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
401
-
402
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
403
-
404
383
  ## secretmanager.SecretIamPolicy
405
384
 
406
385
  ```python
@@ -675,27 +654,6 @@ class SecretIamBinding(pulumi.CustomResource):
675
654
  })
676
655
  ```
677
656
 
678
- ## This resource supports User Project Overrides.
679
-
680
- -
681
-
682
- # IAM policy for Secret Manager Secret
683
- Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
684
-
685
- * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
686
- * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
687
- * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
688
-
689
- A data source can be used to retrieve policy data in advent you do not need creation
690
-
691
- * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
692
-
693
- > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
694
-
695
- > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
696
-
697
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
698
-
699
657
  ## secretmanager.SecretIamPolicy
700
658
 
701
659
  ```python
@@ -380,27 +380,6 @@ class SecretIamMember(pulumi.CustomResource):
380
380
  })
381
381
  ```
382
382
 
383
- ## This resource supports User Project Overrides.
384
-
385
- -
386
-
387
- # IAM policy for Secret Manager Secret
388
- Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
389
-
390
- * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
391
- * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
392
- * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
393
-
394
- A data source can be used to retrieve policy data in advent you do not need creation
395
-
396
- * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
397
-
398
- > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
399
-
400
- > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
401
-
402
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
403
-
404
383
  ## secretmanager.SecretIamPolicy
405
384
 
406
385
  ```python
@@ -675,27 +654,6 @@ class SecretIamMember(pulumi.CustomResource):
675
654
  })
676
655
  ```
677
656
 
678
- ## This resource supports User Project Overrides.
679
-
680
- -
681
-
682
- # IAM policy for Secret Manager Secret
683
- Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
684
-
685
- * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
686
- * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
687
- * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
688
-
689
- A data source can be used to retrieve policy data in advent you do not need creation
690
-
691
- * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
692
-
693
- > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
694
-
695
- > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
696
-
697
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
698
-
699
657
  ## secretmanager.SecretIamPolicy
700
658
 
701
659
  ```python
@@ -265,27 +265,6 @@ class SecretIamPolicy(pulumi.CustomResource):
265
265
  })
266
266
  ```
267
267
 
268
- ## This resource supports User Project Overrides.
269
-
270
- -
271
-
272
- # IAM policy for Secret Manager Secret
273
- Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
274
-
275
- * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
276
- * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
277
- * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
278
-
279
- A data source can be used to retrieve policy data in advent you do not need creation
280
-
281
- * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
282
-
283
- > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
284
-
285
- > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
286
-
287
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
288
-
289
268
  ## secretmanager.SecretIamPolicy
290
269
 
291
270
  ```python
@@ -546,27 +525,6 @@ class SecretIamPolicy(pulumi.CustomResource):
546
525
  })
547
526
  ```
548
527
 
549
- ## This resource supports User Project Overrides.
550
-
551
- -
552
-
553
- # IAM policy for Secret Manager Secret
554
- Three different resources help you manage your IAM policy for Secret Manager Secret. Each of these resources serves a different use case:
555
-
556
- * `secretmanager.SecretIamPolicy`: Authoritative. Sets the IAM policy for the secret and replaces any existing policy already attached.
557
- * `secretmanager.SecretIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the secret are preserved.
558
- * `secretmanager.SecretIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the secret are preserved.
559
-
560
- A data source can be used to retrieve policy data in advent you do not need creation
561
-
562
- * `secretmanager.SecretIamPolicy`: Retrieves the IAM policy for the secret
563
-
564
- > **Note:** `secretmanager.SecretIamPolicy` **cannot** be used in conjunction with `secretmanager.SecretIamBinding` and `secretmanager.SecretIamMember` or they will fight over what your policy should be.
565
-
566
- > **Note:** `secretmanager.SecretIamBinding` resources **can be** used in conjunction with `secretmanager.SecretIamMember` resources **only if** they do not grant privilege to the same role.
567
-
568
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
569
-
570
528
  ## secretmanager.SecretIamPolicy
571
529
 
572
530
  ```python
@@ -371,25 +371,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
371
371
  member="user:jane@example.com")
372
372
  ```
373
373
 
374
- ## This resource supports User Project Overrides.
375
-
376
- -
377
-
378
- # IAM policy for Secure Source Manager Repository
379
- Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
380
-
381
- * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
382
- * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
383
- * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
384
-
385
- A data source can be used to retrieve policy data in advent you do not need creation
386
-
387
- * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
388
-
389
- > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
390
-
391
- > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
392
-
393
374
  ## securesourcemanager.RepositoryIamPolicy
394
375
 
395
376
  ```python
@@ -564,25 +545,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
564
545
  member="user:jane@example.com")
565
546
  ```
566
547
 
567
- ## This resource supports User Project Overrides.
568
-
569
- -
570
-
571
- # IAM policy for Secure Source Manager Repository
572
- Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
573
-
574
- * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
575
- * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
576
- * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
577
-
578
- A data source can be used to retrieve policy data in advent you do not need creation
579
-
580
- * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
581
-
582
- > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
583
-
584
- > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
585
-
586
548
  ## securesourcemanager.RepositoryIamPolicy
587
549
 
588
550
  ```python
@@ -371,25 +371,6 @@ class RepositoryIamMember(pulumi.CustomResource):
371
371
  member="user:jane@example.com")
372
372
  ```
373
373
 
374
- ## This resource supports User Project Overrides.
375
-
376
- -
377
-
378
- # IAM policy for Secure Source Manager Repository
379
- Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
380
-
381
- * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
382
- * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
383
- * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
384
-
385
- A data source can be used to retrieve policy data in advent you do not need creation
386
-
387
- * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
388
-
389
- > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
390
-
391
- > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
392
-
393
374
  ## securesourcemanager.RepositoryIamPolicy
394
375
 
395
376
  ```python
@@ -564,25 +545,6 @@ class RepositoryIamMember(pulumi.CustomResource):
564
545
  member="user:jane@example.com")
565
546
  ```
566
547
 
567
- ## This resource supports User Project Overrides.
568
-
569
- -
570
-
571
- # IAM policy for Secure Source Manager Repository
572
- Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
573
-
574
- * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
575
- * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
576
- * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
577
-
578
- A data source can be used to retrieve policy data in advent you do not need creation
579
-
580
- * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
581
-
582
- > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
583
-
584
- > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
585
-
586
548
  ## securesourcemanager.RepositoryIamPolicy
587
549
 
588
550
  ```python
@@ -268,25 +268,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
268
268
  member="user:jane@example.com")
269
269
  ```
270
270
 
271
- ## This resource supports User Project Overrides.
272
-
273
- -
274
-
275
- # IAM policy for Secure Source Manager Repository
276
- Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
277
-
278
- * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
279
- * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
280
- * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
281
-
282
- A data source can be used to retrieve policy data in advent you do not need creation
283
-
284
- * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
285
-
286
- > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
287
-
288
- > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
289
-
290
271
  ## securesourcemanager.RepositoryIamPolicy
291
272
 
292
273
  ```python
@@ -449,25 +430,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
449
430
  member="user:jane@example.com")
450
431
  ```
451
432
 
452
- ## This resource supports User Project Overrides.
453
-
454
- -
455
-
456
- # IAM policy for Secure Source Manager Repository
457
- Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
458
-
459
- * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
460
- * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
461
- * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
462
-
463
- A data source can be used to retrieve policy data in advent you do not need creation
464
-
465
- * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
466
-
467
- > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
468
-
469
- > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
470
-
471
433
  ## securesourcemanager.RepositoryIamPolicy
472
434
 
473
435
  ```python
@@ -155,9 +155,9 @@ def get_account(account_id: Optional[str] = None,
155
155
  myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
156
156
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
157
157
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
158
- metadata={
159
- "name": "google-application-credentials",
160
- },
158
+ metadata=kubernetes.meta.v1.ObjectMetaArgs(
159
+ name="google-application-credentials",
160
+ ),
161
161
  data={
162
162
  "json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
163
163
  })
@@ -220,9 +220,9 @@ def get_account_output(account_id: Optional[pulumi.Input[str]] = None,
220
220
  myaccount = gcp.serviceaccount.get_account(account_id="myaccount-id")
221
221
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
222
222
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
223
- metadata={
224
- "name": "google-application-credentials",
225
- },
223
+ metadata=kubernetes.meta.v1.ObjectMetaArgs(
224
+ name="google-application-credentials",
225
+ ),
226
226
  data={
227
227
  "json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
228
228
  })