pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -280,26 +280,6 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
-
285
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
- ---
287
-
288
- # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
289
- Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
290
-
291
- * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
292
- * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
293
- * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
294
-
295
- A data source can be used to retrieve policy data in advent you do not need creation
296
-
297
- * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
298
-
299
- > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
300
-
301
- > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
302
-
303
283
  ## accesscontextmanager.AccessPolicyIamPolicy
304
284
 
305
285
  ```python
@@ -451,26 +431,6 @@ class AccessPolicyIamBinding(pulumi.CustomResource):
451
431
  member="user:jane@example.com")
452
432
  ```
453
433
 
454
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
455
-
456
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
457
- ---
458
-
459
- # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
460
- Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
461
-
462
- * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
463
- * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
464
- * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
465
-
466
- A data source can be used to retrieve policy data in advent you do not need creation
467
-
468
- * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
469
-
470
- > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
471
-
472
- > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
473
-
474
434
  ## accesscontextmanager.AccessPolicyIamPolicy
475
435
 
476
436
  ```python
@@ -280,26 +280,6 @@ class AccessPolicyIamMember(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
284
-
285
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
286
- ---
287
-
288
- # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
289
- Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
290
-
291
- * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
292
- * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
293
- * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
294
-
295
- A data source can be used to retrieve policy data in advent you do not need creation
296
-
297
- * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
298
-
299
- > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
300
-
301
- > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
302
-
303
283
  ## accesscontextmanager.AccessPolicyIamPolicy
304
284
 
305
285
  ```python
@@ -451,26 +431,6 @@ class AccessPolicyIamMember(pulumi.CustomResource):
451
431
  member="user:jane@example.com")
452
432
  ```
453
433
 
454
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
455
-
456
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
457
- ---
458
-
459
- # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
460
- Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
461
-
462
- * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
463
- * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
464
- * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
465
-
466
- A data source can be used to retrieve policy data in advent you do not need creation
467
-
468
- * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
469
-
470
- > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
471
-
472
- > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
473
-
474
434
  ## accesscontextmanager.AccessPolicyIamPolicy
475
435
 
476
436
  ```python
@@ -177,26 +177,6 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
177
177
  member="user:jane@example.com")
178
178
  ```
179
179
 
180
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
181
-
182
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
183
- ---
184
-
185
- # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
186
- Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
187
-
188
- * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
189
- * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
190
- * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
191
-
192
- A data source can be used to retrieve policy data in advent you do not need creation
193
-
194
- * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
195
-
196
- > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
197
-
198
- > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
199
-
200
180
  ## accesscontextmanager.AccessPolicyIamPolicy
201
181
 
202
182
  ```python
@@ -336,26 +316,6 @@ class AccessPolicyIamPolicy(pulumi.CustomResource):
336
316
  member="user:jane@example.com")
337
317
  ```
338
318
 
339
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
340
-
341
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
342
- ---
343
-
344
- # IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy
345
- Three different resources help you manage your IAM policy for Access Context Manager (VPC Service Controls) AccessPolicy. Each of these resources serves a different use case:
346
-
347
- * `accesscontextmanager.AccessPolicyIamPolicy`: Authoritative. Sets the IAM policy for the accesspolicy and replaces any existing policy already attached.
348
- * `accesscontextmanager.AccessPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the accesspolicy are preserved.
349
- * `accesscontextmanager.AccessPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the accesspolicy are preserved.
350
-
351
- A data source can be used to retrieve policy data in advent you do not need creation
352
-
353
- * `accesscontextmanager.AccessPolicyIamPolicy`: Retrieves the IAM policy for the accesspolicy
354
-
355
- > **Note:** `accesscontextmanager.AccessPolicyIamPolicy` **cannot** be used in conjunction with `accesscontextmanager.AccessPolicyIamBinding` and `accesscontextmanager.AccessPolicyIamMember` or they will fight over what your policy should be.
356
-
357
- > **Note:** `accesscontextmanager.AccessPolicyIamBinding` resources **can be** used in conjunction with `accesscontextmanager.AccessPolicyIamMember` resources **only if** they do not grant privilege to the same role.
358
-
359
319
  ## accesscontextmanager.AccessPolicyIamPolicy
360
320
 
361
321
  ```python
@@ -347,25 +347,6 @@ class ApiConfigIamBinding(pulumi.CustomResource):
347
347
  member="user:jane@example.com")
348
348
  ```
349
349
 
350
- ## This resource supports User Project Overrides.
351
-
352
- -
353
-
354
- # IAM policy for API Gateway ApiConfig
355
- Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
356
-
357
- * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
358
- * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
359
- * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
360
-
361
- A data source can be used to retrieve policy data in advent you do not need creation
362
-
363
- * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
364
-
365
- > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
366
-
367
- > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
368
-
369
350
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
370
351
 
371
352
  ```python
@@ -530,25 +511,6 @@ class ApiConfigIamBinding(pulumi.CustomResource):
530
511
  member="user:jane@example.com")
531
512
  ```
532
513
 
533
- ## This resource supports User Project Overrides.
534
-
535
- -
536
-
537
- # IAM policy for API Gateway ApiConfig
538
- Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
539
-
540
- * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
541
- * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
542
- * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
543
-
544
- A data source can be used to retrieve policy data in advent you do not need creation
545
-
546
- * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
547
-
548
- > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
549
-
550
- > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
551
-
552
514
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
553
515
 
554
516
  ```python
@@ -347,25 +347,6 @@ class ApiConfigIamMember(pulumi.CustomResource):
347
347
  member="user:jane@example.com")
348
348
  ```
349
349
 
350
- ## This resource supports User Project Overrides.
351
-
352
- -
353
-
354
- # IAM policy for API Gateway ApiConfig
355
- Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
356
-
357
- * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
358
- * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
359
- * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
360
-
361
- A data source can be used to retrieve policy data in advent you do not need creation
362
-
363
- * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
364
-
365
- > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
366
-
367
- > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
368
-
369
350
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
370
351
 
371
352
  ```python
@@ -530,25 +511,6 @@ class ApiConfigIamMember(pulumi.CustomResource):
530
511
  member="user:jane@example.com")
531
512
  ```
532
513
 
533
- ## This resource supports User Project Overrides.
534
-
535
- -
536
-
537
- # IAM policy for API Gateway ApiConfig
538
- Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
539
-
540
- * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
541
- * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
542
- * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
543
-
544
- A data source can be used to retrieve policy data in advent you do not need creation
545
-
546
- * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
547
-
548
- > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
549
-
550
- > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
551
-
552
514
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
553
515
 
554
516
  ```python
@@ -244,25 +244,6 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
244
244
  member="user:jane@example.com")
245
245
  ```
246
246
 
247
- ## This resource supports User Project Overrides.
248
-
249
- -
250
-
251
- # IAM policy for API Gateway ApiConfig
252
- Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
253
-
254
- * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
255
- * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
256
- * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
257
-
258
- A data source can be used to retrieve policy data in advent you do not need creation
259
-
260
- * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
261
-
262
- > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
263
-
264
- > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
265
-
266
247
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
267
248
 
268
249
  ```python
@@ -415,25 +396,6 @@ class ApiConfigIamPolicy(pulumi.CustomResource):
415
396
  member="user:jane@example.com")
416
397
  ```
417
398
 
418
- ## This resource supports User Project Overrides.
419
-
420
- -
421
-
422
- # IAM policy for API Gateway ApiConfig
423
- Three different resources help you manage your IAM policy for API Gateway ApiConfig. Each of these resources serves a different use case:
424
-
425
- * `apigateway.ApiConfigIamPolicy`: Authoritative. Sets the IAM policy for the apiconfig and replaces any existing policy already attached.
426
- * `apigateway.ApiConfigIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the apiconfig are preserved.
427
- * `apigateway.ApiConfigIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the apiconfig are preserved.
428
-
429
- A data source can be used to retrieve policy data in advent you do not need creation
430
-
431
- * `apigateway.ApiConfigIamPolicy`: Retrieves the IAM policy for the apiconfig
432
-
433
- > **Note:** `apigateway.ApiConfigIamPolicy` **cannot** be used in conjunction with `apigateway.ApiConfigIamBinding` and `apigateway.ApiConfigIamMember` or they will fight over what your policy should be.
434
-
435
- > **Note:** `apigateway.ApiConfigIamBinding` resources **can be** used in conjunction with `apigateway.ApiConfigIamMember` resources **only if** they do not grant privilege to the same role.
436
-
437
399
  ## google\\_api\\_gateway\\_api\\_config\\_iam\\_policy
438
400
 
439
401
  ```python
@@ -311,25 +311,6 @@ class ApiIamBinding(pulumi.CustomResource):
311
311
  member="user:jane@example.com")
312
312
  ```
313
313
 
314
- ## This resource supports User Project Overrides.
315
-
316
- -
317
-
318
- # IAM policy for API Gateway Api
319
- Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
320
-
321
- * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
322
- * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
323
- * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
324
-
325
- A data source can be used to retrieve policy data in advent you do not need creation
326
-
327
- * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
328
-
329
- > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
330
-
331
- > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
332
-
333
314
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
334
315
 
335
316
  ```python
@@ -490,25 +471,6 @@ class ApiIamBinding(pulumi.CustomResource):
490
471
  member="user:jane@example.com")
491
472
  ```
492
473
 
493
- ## This resource supports User Project Overrides.
494
-
495
- -
496
-
497
- # IAM policy for API Gateway Api
498
- Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
499
-
500
- * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
501
- * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
502
- * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
503
-
504
- A data source can be used to retrieve policy data in advent you do not need creation
505
-
506
- * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
507
-
508
- > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
509
-
510
- > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
511
-
512
474
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
513
475
 
514
476
  ```python
@@ -311,25 +311,6 @@ class ApiIamMember(pulumi.CustomResource):
311
311
  member="user:jane@example.com")
312
312
  ```
313
313
 
314
- ## This resource supports User Project Overrides.
315
-
316
- -
317
-
318
- # IAM policy for API Gateway Api
319
- Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
320
-
321
- * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
322
- * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
323
- * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
324
-
325
- A data source can be used to retrieve policy data in advent you do not need creation
326
-
327
- * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
328
-
329
- > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
330
-
331
- > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
332
-
333
314
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
334
315
 
335
316
  ```python
@@ -490,25 +471,6 @@ class ApiIamMember(pulumi.CustomResource):
490
471
  member="user:jane@example.com")
491
472
  ```
492
473
 
493
- ## This resource supports User Project Overrides.
494
-
495
- -
496
-
497
- # IAM policy for API Gateway Api
498
- Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
499
-
500
- * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
501
- * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
502
- * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
503
-
504
- A data source can be used to retrieve policy data in advent you do not need creation
505
-
506
- * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
507
-
508
- > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
509
-
510
- > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
511
-
512
474
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
513
475
 
514
476
  ```python
@@ -208,25 +208,6 @@ class ApiIamPolicy(pulumi.CustomResource):
208
208
  member="user:jane@example.com")
209
209
  ```
210
210
 
211
- ## This resource supports User Project Overrides.
212
-
213
- -
214
-
215
- # IAM policy for API Gateway Api
216
- Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
217
-
218
- * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
219
- * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
220
- * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
221
-
222
- A data source can be used to retrieve policy data in advent you do not need creation
223
-
224
- * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
225
-
226
- > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
227
-
228
- > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
229
-
230
211
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
231
212
 
232
213
  ```python
@@ -375,25 +356,6 @@ class ApiIamPolicy(pulumi.CustomResource):
375
356
  member="user:jane@example.com")
376
357
  ```
377
358
 
378
- ## This resource supports User Project Overrides.
379
-
380
- -
381
-
382
- # IAM policy for API Gateway Api
383
- Three different resources help you manage your IAM policy for API Gateway Api. Each of these resources serves a different use case:
384
-
385
- * `apigateway.ApiIamPolicy`: Authoritative. Sets the IAM policy for the api and replaces any existing policy already attached.
386
- * `apigateway.ApiIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the api are preserved.
387
- * `apigateway.ApiIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the api are preserved.
388
-
389
- A data source can be used to retrieve policy data in advent you do not need creation
390
-
391
- * `apigateway.ApiIamPolicy`: Retrieves the IAM policy for the api
392
-
393
- > **Note:** `apigateway.ApiIamPolicy` **cannot** be used in conjunction with `apigateway.ApiIamBinding` and `apigateway.ApiIamMember` or they will fight over what your policy should be.
394
-
395
- > **Note:** `apigateway.ApiIamBinding` resources **can be** used in conjunction with `apigateway.ApiIamMember` resources **only if** they do not grant privilege to the same role.
396
-
397
359
  ## google\\_api\\_gateway\\_api\\_iam\\_policy
398
360
 
399
361
  ```python
@@ -359,25 +359,6 @@ class GatewayIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
- ## This resource supports User Project Overrides.
363
-
364
- -
365
-
366
- # IAM policy for API Gateway Gateway
367
- Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
368
-
369
- * `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
370
- * `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
371
- * `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
372
-
373
- A data source can be used to retrieve policy data in advent you do not need creation
374
-
375
- * `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
376
-
377
- > **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
378
-
379
- > **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
380
-
381
362
  ## google\\_api\\_gateway\\_gateway\\_iam\\_policy
382
363
 
383
364
  ```python
@@ -550,25 +531,6 @@ class GatewayIamBinding(pulumi.CustomResource):
550
531
  member="user:jane@example.com")
551
532
  ```
552
533
 
553
- ## This resource supports User Project Overrides.
554
-
555
- -
556
-
557
- # IAM policy for API Gateway Gateway
558
- Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
559
-
560
- * `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
561
- * `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
562
- * `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
563
-
564
- A data source can be used to retrieve policy data in advent you do not need creation
565
-
566
- * `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
567
-
568
- > **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
569
-
570
- > **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
571
-
572
534
  ## google\\_api\\_gateway\\_gateway\\_iam\\_policy
573
535
 
574
536
  ```python
@@ -359,25 +359,6 @@ class GatewayIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
- ## This resource supports User Project Overrides.
363
-
364
- -
365
-
366
- # IAM policy for API Gateway Gateway
367
- Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
368
-
369
- * `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
370
- * `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
371
- * `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
372
-
373
- A data source can be used to retrieve policy data in advent you do not need creation
374
-
375
- * `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
376
-
377
- > **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
378
-
379
- > **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
380
-
381
362
  ## google\\_api\\_gateway\\_gateway\\_iam\\_policy
382
363
 
383
364
  ```python
@@ -550,25 +531,6 @@ class GatewayIamMember(pulumi.CustomResource):
550
531
  member="user:jane@example.com")
551
532
  ```
552
533
 
553
- ## This resource supports User Project Overrides.
554
-
555
- -
556
-
557
- # IAM policy for API Gateway Gateway
558
- Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
559
-
560
- * `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
561
- * `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
562
- * `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
563
-
564
- A data source can be used to retrieve policy data in advent you do not need creation
565
-
566
- * `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
567
-
568
- > **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
569
-
570
- > **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
571
-
572
534
  ## google\\_api\\_gateway\\_gateway\\_iam\\_policy
573
535
 
574
536
  ```python
@@ -256,25 +256,6 @@ class GatewayIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
- ## This resource supports User Project Overrides.
260
-
261
- -
262
-
263
- # IAM policy for API Gateway Gateway
264
- Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
265
-
266
- * `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
267
- * `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
268
- * `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
269
-
270
- A data source can be used to retrieve policy data in advent you do not need creation
271
-
272
- * `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
273
-
274
- > **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
275
-
276
- > **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
277
-
278
259
  ## google\\_api\\_gateway\\_gateway\\_iam\\_policy
279
260
 
280
261
  ```python
@@ -435,25 +416,6 @@ class GatewayIamPolicy(pulumi.CustomResource):
435
416
  member="user:jane@example.com")
436
417
  ```
437
418
 
438
- ## This resource supports User Project Overrides.
439
-
440
- -
441
-
442
- # IAM policy for API Gateway Gateway
443
- Three different resources help you manage your IAM policy for API Gateway Gateway. Each of these resources serves a different use case:
444
-
445
- * `apigateway.GatewayIamPolicy`: Authoritative. Sets the IAM policy for the gateway and replaces any existing policy already attached.
446
- * `apigateway.GatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the gateway are preserved.
447
- * `apigateway.GatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the gateway are preserved.
448
-
449
- A data source can be used to retrieve policy data in advent you do not need creation
450
-
451
- * `apigateway.GatewayIamPolicy`: Retrieves the IAM policy for the gateway
452
-
453
- > **Note:** `apigateway.GatewayIamPolicy` **cannot** be used in conjunction with `apigateway.GatewayIamBinding` and `apigateway.GatewayIamMember` or they will fight over what your policy should be.
454
-
455
- > **Note:** `apigateway.GatewayIamBinding` resources **can be** used in conjunction with `apigateway.GatewayIamMember` resources **only if** they do not grant privilege to the same role.
456
-
457
419
  ## google\\_api\\_gateway\\_gateway\\_iam\\_policy
458
420
 
459
421
  ```python