pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723010828__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723010828.dist-info}/top_level.txt +0 -0
@@ -402,9 +402,9 @@ class Key(pulumi.CustomResource):
402
402
  display_name="My Service Account")
403
403
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
404
404
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
405
- metadata={
406
- "name": "google-application-credentials",
407
- },
405
+ metadata=kubernetes.meta.v1.ObjectMetaArgs(
406
+ name="google-application-credentials",
407
+ ),
408
408
  data={
409
409
  "credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
410
410
  })
@@ -488,9 +488,9 @@ class Key(pulumi.CustomResource):
488
488
  display_name="My Service Account")
489
489
  mykey = gcp.serviceaccount.Key("mykey", service_account_id=myaccount.name)
490
490
  google_application_credentials = kubernetes.core.v1.Secret("google-application-credentials",
491
- metadata={
492
- "name": "google-application-credentials",
493
- },
491
+ metadata=kubernetes.meta.v1.ObjectMetaArgs(
492
+ name="google-application-credentials",
493
+ ),
494
494
  data={
495
495
  "credentials.json": std.base64decode_output(input=mykey.private_key).apply(lambda invoke: invoke.result),
496
496
  })
@@ -280,26 +280,6 @@ class NamespaceIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
-
285
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
- ---
287
-
288
- # IAM policy for Service Directory Namespace
289
- Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
290
-
291
- * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
292
- * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
293
- * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
294
-
295
- A data source can be used to retrieve policy data in advent you do not need creation
296
-
297
- * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
298
-
299
- > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
300
-
301
- > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
302
-
303
283
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
304
284
 
305
285
  ```python
@@ -453,26 +433,6 @@ class NamespaceIamBinding(pulumi.CustomResource):
453
433
  member="user:jane@example.com")
454
434
  ```
455
435
 
456
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
-
458
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
- ---
460
-
461
- # IAM policy for Service Directory Namespace
462
- Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
463
-
464
- * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
465
- * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
466
- * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
467
-
468
- A data source can be used to retrieve policy data in advent you do not need creation
469
-
470
- * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
471
-
472
- > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
473
-
474
- > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
475
-
476
436
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
477
437
 
478
438
  ```python
@@ -280,26 +280,6 @@ class NamespaceIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
-
285
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
- ---
287
-
288
- # IAM policy for Service Directory Namespace
289
- Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
290
-
291
- * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
292
- * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
293
- * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
294
-
295
- A data source can be used to retrieve policy data in advent you do not need creation
296
-
297
- * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
298
-
299
- > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
300
-
301
- > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
302
-
303
283
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
304
284
 
305
285
  ```python
@@ -453,26 +433,6 @@ class NamespaceIamMember(pulumi.CustomResource):
453
433
  member="user:jane@example.com")
454
434
  ```
455
435
 
456
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
-
458
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
- ---
460
-
461
- # IAM policy for Service Directory Namespace
462
- Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
463
-
464
- * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
465
- * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
466
- * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
467
-
468
- A data source can be used to retrieve policy data in advent you do not need creation
469
-
470
- * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
471
-
472
- > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
473
-
474
- > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
475
-
476
436
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
477
437
 
478
438
  ```python
@@ -177,26 +177,6 @@ class NamespaceIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
-
182
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
- ---
184
-
185
- # IAM policy for Service Directory Namespace
186
- Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
187
-
188
- * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
189
- * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
190
- * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
191
-
192
- A data source can be used to retrieve policy data in advent you do not need creation
193
-
194
- * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
195
-
196
- > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
197
-
198
- > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
199
-
200
180
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
201
181
 
202
182
  ```python
@@ -338,26 +318,6 @@ class NamespaceIamPolicy(pulumi.CustomResource):
338
318
  member="user:jane@example.com")
339
319
  ```
340
320
 
341
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
342
-
343
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
344
- ---
345
-
346
- # IAM policy for Service Directory Namespace
347
- Three different resources help you manage your IAM policy for Service Directory Namespace. Each of these resources serves a different use case:
348
-
349
- * `servicedirectory.NamespaceIamPolicy`: Authoritative. Sets the IAM policy for the namespace and replaces any existing policy already attached.
350
- * `servicedirectory.NamespaceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the namespace are preserved.
351
- * `servicedirectory.NamespaceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the namespace are preserved.
352
-
353
- A data source can be used to retrieve policy data in advent you do not need creation
354
-
355
- * `servicedirectory.NamespaceIamPolicy`: Retrieves the IAM policy for the namespace
356
-
357
- > **Note:** `servicedirectory.NamespaceIamPolicy` **cannot** be used in conjunction with `servicedirectory.NamespaceIamBinding` and `servicedirectory.NamespaceIamMember` or they will fight over what your policy should be.
358
-
359
- > **Note:** `servicedirectory.NamespaceIamBinding` resources **can be** used in conjunction with `servicedirectory.NamespaceIamMember` resources **only if** they do not grant privilege to the same role.
360
-
361
321
  ## google\\_service\\_directory\\_namespace\\_iam\\_policy
362
322
 
363
323
  ```python
@@ -280,26 +280,6 @@ class ServiceIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
-
285
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
- ---
287
-
288
- # IAM policy for Service Directory Service
289
- Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
290
-
291
- * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
292
- * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
293
- * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
294
-
295
- A data source can be used to retrieve policy data in advent you do not need creation
296
-
297
- * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
298
-
299
- > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
300
-
301
- > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
302
-
303
283
  ## google\\_service\\_directory\\_service\\_iam\\_policy
304
284
 
305
285
  ```python
@@ -453,26 +433,6 @@ class ServiceIamBinding(pulumi.CustomResource):
453
433
  member="user:jane@example.com")
454
434
  ```
455
435
 
456
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
-
458
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
- ---
460
-
461
- # IAM policy for Service Directory Service
462
- Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
463
-
464
- * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
465
- * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
466
- * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
467
-
468
- A data source can be used to retrieve policy data in advent you do not need creation
469
-
470
- * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
471
-
472
- > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
473
-
474
- > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
475
-
476
436
  ## google\\_service\\_directory\\_service\\_iam\\_policy
477
437
 
478
438
  ```python
@@ -280,26 +280,6 @@ class ServiceIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
-
285
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
- ---
287
-
288
- # IAM policy for Service Directory Service
289
- Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
290
-
291
- * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
292
- * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
293
- * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
294
-
295
- A data source can be used to retrieve policy data in advent you do not need creation
296
-
297
- * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
298
-
299
- > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
300
-
301
- > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
302
-
303
283
  ## google\\_service\\_directory\\_service\\_iam\\_policy
304
284
 
305
285
  ```python
@@ -453,26 +433,6 @@ class ServiceIamMember(pulumi.CustomResource):
453
433
  member="user:jane@example.com")
454
434
  ```
455
435
 
456
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
457
-
458
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
459
- ---
460
-
461
- # IAM policy for Service Directory Service
462
- Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
463
-
464
- * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
465
- * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
466
- * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
467
-
468
- A data source can be used to retrieve policy data in advent you do not need creation
469
-
470
- * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
471
-
472
- > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
473
-
474
- > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
475
-
476
436
  ## google\\_service\\_directory\\_service\\_iam\\_policy
477
437
 
478
438
  ```python
@@ -177,26 +177,6 @@ class ServiceIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
-
182
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
- ---
184
-
185
- # IAM policy for Service Directory Service
186
- Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
187
-
188
- * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
189
- * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
190
- * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
191
-
192
- A data source can be used to retrieve policy data in advent you do not need creation
193
-
194
- * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
195
-
196
- > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
197
-
198
- > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
199
-
200
180
  ## google\\_service\\_directory\\_service\\_iam\\_policy
201
181
 
202
182
  ```python
@@ -338,26 +318,6 @@ class ServiceIamPolicy(pulumi.CustomResource):
338
318
  member="user:jane@example.com")
339
319
  ```
340
320
 
341
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
342
-
343
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
344
- ---
345
-
346
- # IAM policy for Service Directory Service
347
- Three different resources help you manage your IAM policy for Service Directory Service. Each of these resources serves a different use case:
348
-
349
- * `servicedirectory.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
350
- * `servicedirectory.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
351
- * `servicedirectory.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
352
-
353
- A data source can be used to retrieve policy data in advent you do not need creation
354
-
355
- * `servicedirectory.ServiceIamPolicy`: Retrieves the IAM policy for the service
356
-
357
- > **Note:** `servicedirectory.ServiceIamPolicy` **cannot** be used in conjunction with `servicedirectory.ServiceIamBinding` and `servicedirectory.ServiceIamMember` or they will fight over what your policy should be.
358
-
359
- > **Note:** `servicedirectory.ServiceIamBinding` resources **can be** used in conjunction with `servicedirectory.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
360
-
361
321
  ## google\\_service\\_directory\\_service\\_iam\\_policy
362
322
 
363
323
  ```python
@@ -319,25 +319,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
- ## This resource supports User Project Overrides.
323
-
324
- -
325
-
326
- # IAM policy for Cloud Source Repositories Repository
327
- Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
328
-
329
- * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
330
- * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
331
- * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
332
-
333
- A data source can be used to retrieve policy data in advent you do not need creation
334
-
335
- * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
336
-
337
- > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
338
-
339
- > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
340
-
341
322
  ## sourcerepo.RepositoryIamPolicy
342
323
 
343
324
  ```python
@@ -497,25 +478,6 @@ class RepositoryIamBinding(pulumi.CustomResource):
497
478
  member="user:jane@example.com")
498
479
  ```
499
480
 
500
- ## This resource supports User Project Overrides.
501
-
502
- -
503
-
504
- # IAM policy for Cloud Source Repositories Repository
505
- Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
506
-
507
- * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
508
- * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
509
- * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
510
-
511
- A data source can be used to retrieve policy data in advent you do not need creation
512
-
513
- * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
514
-
515
- > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
516
-
517
- > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
518
-
519
481
  ## sourcerepo.RepositoryIamPolicy
520
482
 
521
483
  ```python
@@ -319,25 +319,6 @@ class RepositoryIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
- ## This resource supports User Project Overrides.
323
-
324
- -
325
-
326
- # IAM policy for Cloud Source Repositories Repository
327
- Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
328
-
329
- * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
330
- * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
331
- * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
332
-
333
- A data source can be used to retrieve policy data in advent you do not need creation
334
-
335
- * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
336
-
337
- > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
338
-
339
- > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
340
-
341
322
  ## sourcerepo.RepositoryIamPolicy
342
323
 
343
324
  ```python
@@ -497,25 +478,6 @@ class RepositoryIamMember(pulumi.CustomResource):
497
478
  member="user:jane@example.com")
498
479
  ```
499
480
 
500
- ## This resource supports User Project Overrides.
501
-
502
- -
503
-
504
- # IAM policy for Cloud Source Repositories Repository
505
- Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
506
-
507
- * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
508
- * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
509
- * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
510
-
511
- A data source can be used to retrieve policy data in advent you do not need creation
512
-
513
- * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
514
-
515
- > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
516
-
517
- > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
518
-
519
481
  ## sourcerepo.RepositoryIamPolicy
520
482
 
521
483
  ```python
@@ -216,25 +216,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
- ## This resource supports User Project Overrides.
220
-
221
- -
222
-
223
- # IAM policy for Cloud Source Repositories Repository
224
- Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
225
-
226
- * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
227
- * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
228
- * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
229
-
230
- A data source can be used to retrieve policy data in advent you do not need creation
231
-
232
- * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
233
-
234
- > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
235
-
236
- > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
237
-
238
219
  ## sourcerepo.RepositoryIamPolicy
239
220
 
240
221
  ```python
@@ -382,25 +363,6 @@ class RepositoryIamPolicy(pulumi.CustomResource):
382
363
  member="user:jane@example.com")
383
364
  ```
384
365
 
385
- ## This resource supports User Project Overrides.
386
-
387
- -
388
-
389
- # IAM policy for Cloud Source Repositories Repository
390
- Three different resources help you manage your IAM policy for Cloud Source Repositories Repository. Each of these resources serves a different use case:
391
-
392
- * `sourcerepo.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
393
- * `sourcerepo.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
394
- * `sourcerepo.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
395
-
396
- A data source can be used to retrieve policy data in advent you do not need creation
397
-
398
- * `sourcerepo.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
399
-
400
- > **Note:** `sourcerepo.RepositoryIamPolicy` **cannot** be used in conjunction with `sourcerepo.RepositoryIamBinding` and `sourcerepo.RepositoryIamMember` or they will fight over what your policy should be.
401
-
402
- > **Note:** `sourcerepo.RepositoryIamBinding` resources **can be** used in conjunction with `sourcerepo.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
403
-
404
366
  ## sourcerepo.RepositoryIamPolicy
405
367
 
406
368
  ```python
@@ -407,6 +407,43 @@ class DatabaseIAMBinding(pulumi.CustomResource):
407
407
  })
408
408
  ```
409
409
 
410
+ ## spanner.DatabaseIAMPolicy
411
+
412
+ ```python
413
+ import pulumi
414
+ import pulumi_gcp as gcp
415
+
416
+ admin = gcp.organizations.get_iam_policy(bindings=[{
417
+ "role": "roles/editor",
418
+ "members": ["user:jane@example.com"],
419
+ }])
420
+ database = gcp.spanner.DatabaseIAMPolicy("database",
421
+ instance="your-instance-name",
422
+ database="your-database-name",
423
+ policy_data=admin.policy_data)
424
+ ```
425
+
426
+ With IAM Conditions:
427
+
428
+ ```python
429
+ import pulumi
430
+ import pulumi_gcp as gcp
431
+
432
+ admin = gcp.organizations.get_iam_policy(bindings=[{
433
+ "role": "roles/editor",
434
+ "members": ["user:jane@example.com"],
435
+ "condition": {
436
+ "title": "My Role",
437
+ "description": "Grant permissions on my_role",
438
+ "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
439
+ },
440
+ }])
441
+ database = gcp.spanner.DatabaseIAMPolicy("database",
442
+ instance="your-instance-name",
443
+ database="your-database-name",
444
+ policy_data=admin.policy_data)
445
+ ```
446
+
410
447
  ## spanner.DatabaseIAMBinding
411
448
 
412
449
  ```python
@@ -634,6 +671,43 @@ class DatabaseIAMBinding(pulumi.CustomResource):
634
671
  })
635
672
  ```
636
673
 
674
+ ## spanner.DatabaseIAMPolicy
675
+
676
+ ```python
677
+ import pulumi
678
+ import pulumi_gcp as gcp
679
+
680
+ admin = gcp.organizations.get_iam_policy(bindings=[{
681
+ "role": "roles/editor",
682
+ "members": ["user:jane@example.com"],
683
+ }])
684
+ database = gcp.spanner.DatabaseIAMPolicy("database",
685
+ instance="your-instance-name",
686
+ database="your-database-name",
687
+ policy_data=admin.policy_data)
688
+ ```
689
+
690
+ With IAM Conditions:
691
+
692
+ ```python
693
+ import pulumi
694
+ import pulumi_gcp as gcp
695
+
696
+ admin = gcp.organizations.get_iam_policy(bindings=[{
697
+ "role": "roles/editor",
698
+ "members": ["user:jane@example.com"],
699
+ "condition": {
700
+ "title": "My Role",
701
+ "description": "Grant permissions on my_role",
702
+ "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
703
+ },
704
+ }])
705
+ database = gcp.spanner.DatabaseIAMPolicy("database",
706
+ instance="your-instance-name",
707
+ database="your-database-name",
708
+ policy_data=admin.policy_data)
709
+ ```
710
+
637
711
  ## spanner.DatabaseIAMBinding
638
712
 
639
713
  ```python