pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -288,6 +288,49 @@ class IamAuditConfig(pulumi.CustomResource):
288
288
  ])
289
289
  ```
290
290
 
291
+ ## folder.IAMPolicy
292
+
293
+ !> **Be careful!** You can accidentally lock yourself out of your folder
294
+ using this resource. Deleting a `folder.IAMPolicy` removes access
295
+ from anyone without permissions on its parent folder/organization. Proceed with caution.
296
+ It's not recommended to use `folder.IAMPolicy` with your provider folder
297
+ to avoid locking yourself out, and it should generally only be used with folders
298
+ fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
299
+ applying the change.
300
+
301
+ ```python
302
+ import pulumi
303
+ import pulumi_gcp as gcp
304
+
305
+ admin = gcp.organizations.get_iam_policy(bindings=[{
306
+ "role": "roles/editor",
307
+ "members": ["user:jane@example.com"],
308
+ }])
309
+ folder = gcp.folder.IAMPolicy("folder",
310
+ folder="folders/1234567",
311
+ policy_data=admin.policy_data)
312
+ ```
313
+
314
+ With IAM Conditions:
315
+
316
+ ```python
317
+ import pulumi
318
+ import pulumi_gcp as gcp
319
+
320
+ admin = gcp.organizations.get_iam_policy(bindings=[{
321
+ "role": "roles/compute.admin",
322
+ "members": ["user:jane@example.com"],
323
+ "condition": {
324
+ "title": "expires_after_2019_12_31",
325
+ "description": "Expiring at midnight of 2019-12-31",
326
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
327
+ },
328
+ }])
329
+ folder = gcp.folder.IAMPolicy("folder",
330
+ folder="folders/1234567",
331
+ policy_data=admin.policy_data)
332
+ ```
333
+
291
334
  ## folder.IAMBinding
292
335
 
293
336
  ```python
@@ -540,6 +583,49 @@ class IamAuditConfig(pulumi.CustomResource):
540
583
  ])
541
584
  ```
542
585
 
586
+ ## folder.IAMPolicy
587
+
588
+ !> **Be careful!** You can accidentally lock yourself out of your folder
589
+ using this resource. Deleting a `folder.IAMPolicy` removes access
590
+ from anyone without permissions on its parent folder/organization. Proceed with caution.
591
+ It's not recommended to use `folder.IAMPolicy` with your provider folder
592
+ to avoid locking yourself out, and it should generally only be used with folders
593
+ fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
594
+ applying the change.
595
+
596
+ ```python
597
+ import pulumi
598
+ import pulumi_gcp as gcp
599
+
600
+ admin = gcp.organizations.get_iam_policy(bindings=[{
601
+ "role": "roles/editor",
602
+ "members": ["user:jane@example.com"],
603
+ }])
604
+ folder = gcp.folder.IAMPolicy("folder",
605
+ folder="folders/1234567",
606
+ policy_data=admin.policy_data)
607
+ ```
608
+
609
+ With IAM Conditions:
610
+
611
+ ```python
612
+ import pulumi
613
+ import pulumi_gcp as gcp
614
+
615
+ admin = gcp.organizations.get_iam_policy(bindings=[{
616
+ "role": "roles/compute.admin",
617
+ "members": ["user:jane@example.com"],
618
+ "condition": {
619
+ "title": "expires_after_2019_12_31",
620
+ "description": "Expiring at midnight of 2019-12-31",
621
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
622
+ },
623
+ }])
624
+ folder = gcp.folder.IAMPolicy("folder",
625
+ folder="folders/1234567",
626
+ policy_data=admin.policy_data)
627
+ ```
628
+
543
629
  ## folder.IAMBinding
544
630
 
545
631
  ```python
@@ -353,6 +353,49 @@ class IAMMember(pulumi.CustomResource):
353
353
  ])
354
354
  ```
355
355
 
356
+ ## folder.IAMPolicy
357
+
358
+ !> **Be careful!** You can accidentally lock yourself out of your folder
359
+ using this resource. Deleting a `folder.IAMPolicy` removes access
360
+ from anyone without permissions on its parent folder/organization. Proceed with caution.
361
+ It's not recommended to use `folder.IAMPolicy` with your provider folder
362
+ to avoid locking yourself out, and it should generally only be used with folders
363
+ fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
364
+ applying the change.
365
+
366
+ ```python
367
+ import pulumi
368
+ import pulumi_gcp as gcp
369
+
370
+ admin = gcp.organizations.get_iam_policy(bindings=[{
371
+ "role": "roles/editor",
372
+ "members": ["user:jane@example.com"],
373
+ }])
374
+ folder = gcp.folder.IAMPolicy("folder",
375
+ folder="folders/1234567",
376
+ policy_data=admin.policy_data)
377
+ ```
378
+
379
+ With IAM Conditions:
380
+
381
+ ```python
382
+ import pulumi
383
+ import pulumi_gcp as gcp
384
+
385
+ admin = gcp.organizations.get_iam_policy(bindings=[{
386
+ "role": "roles/compute.admin",
387
+ "members": ["user:jane@example.com"],
388
+ "condition": {
389
+ "title": "expires_after_2019_12_31",
390
+ "description": "Expiring at midnight of 2019-12-31",
391
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
392
+ },
393
+ }])
394
+ folder = gcp.folder.IAMPolicy("folder",
395
+ folder="folders/1234567",
396
+ policy_data=admin.policy_data)
397
+ ```
398
+
356
399
  ## folder.IAMBinding
357
400
 
358
401
  ```python
@@ -614,6 +657,49 @@ class IAMMember(pulumi.CustomResource):
614
657
  ])
615
658
  ```
616
659
 
660
+ ## folder.IAMPolicy
661
+
662
+ !> **Be careful!** You can accidentally lock yourself out of your folder
663
+ using this resource. Deleting a `folder.IAMPolicy` removes access
664
+ from anyone without permissions on its parent folder/organization. Proceed with caution.
665
+ It's not recommended to use `folder.IAMPolicy` with your provider folder
666
+ to avoid locking yourself out, and it should generally only be used with folders
667
+ fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
668
+ applying the change.
669
+
670
+ ```python
671
+ import pulumi
672
+ import pulumi_gcp as gcp
673
+
674
+ admin = gcp.organizations.get_iam_policy(bindings=[{
675
+ "role": "roles/editor",
676
+ "members": ["user:jane@example.com"],
677
+ }])
678
+ folder = gcp.folder.IAMPolicy("folder",
679
+ folder="folders/1234567",
680
+ policy_data=admin.policy_data)
681
+ ```
682
+
683
+ With IAM Conditions:
684
+
685
+ ```python
686
+ import pulumi
687
+ import pulumi_gcp as gcp
688
+
689
+ admin = gcp.organizations.get_iam_policy(bindings=[{
690
+ "role": "roles/compute.admin",
691
+ "members": ["user:jane@example.com"],
692
+ "condition": {
693
+ "title": "expires_after_2019_12_31",
694
+ "description": "Expiring at midnight of 2019-12-31",
695
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
696
+ },
697
+ }])
698
+ folder = gcp.folder.IAMPolicy("folder",
699
+ folder="folders/1234567",
700
+ policy_data=admin.policy_data)
701
+ ```
702
+
617
703
  ## folder.IAMBinding
618
704
 
619
705
  ```python
@@ -282,6 +282,49 @@ class IAMPolicy(pulumi.CustomResource):
282
282
  ])
283
283
  ```
284
284
 
285
+ ## folder.IAMPolicy
286
+
287
+ !> **Be careful!** You can accidentally lock yourself out of your folder
288
+ using this resource. Deleting a `folder.IAMPolicy` removes access
289
+ from anyone without permissions on its parent folder/organization. Proceed with caution.
290
+ It's not recommended to use `folder.IAMPolicy` with your provider folder
291
+ to avoid locking yourself out, and it should generally only be used with folders
292
+ fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
293
+ applying the change.
294
+
295
+ ```python
296
+ import pulumi
297
+ import pulumi_gcp as gcp
298
+
299
+ admin = gcp.organizations.get_iam_policy(bindings=[{
300
+ "role": "roles/editor",
301
+ "members": ["user:jane@example.com"],
302
+ }])
303
+ folder = gcp.folder.IAMPolicy("folder",
304
+ folder="folders/1234567",
305
+ policy_data=admin.policy_data)
306
+ ```
307
+
308
+ With IAM Conditions:
309
+
310
+ ```python
311
+ import pulumi
312
+ import pulumi_gcp as gcp
313
+
314
+ admin = gcp.organizations.get_iam_policy(bindings=[{
315
+ "role": "roles/compute.admin",
316
+ "members": ["user:jane@example.com"],
317
+ "condition": {
318
+ "title": "expires_after_2019_12_31",
319
+ "description": "Expiring at midnight of 2019-12-31",
320
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
321
+ },
322
+ }])
323
+ folder = gcp.folder.IAMPolicy("folder",
324
+ folder="folders/1234567",
325
+ policy_data=admin.policy_data)
326
+ ```
327
+
285
328
  ## folder.IAMBinding
286
329
 
287
330
  ```python
@@ -540,6 +583,49 @@ class IAMPolicy(pulumi.CustomResource):
540
583
  ])
541
584
  ```
542
585
 
586
+ ## folder.IAMPolicy
587
+
588
+ !> **Be careful!** You can accidentally lock yourself out of your folder
589
+ using this resource. Deleting a `folder.IAMPolicy` removes access
590
+ from anyone without permissions on its parent folder/organization. Proceed with caution.
591
+ It's not recommended to use `folder.IAMPolicy` with your provider folder
592
+ to avoid locking yourself out, and it should generally only be used with folders
593
+ fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
594
+ applying the change.
595
+
596
+ ```python
597
+ import pulumi
598
+ import pulumi_gcp as gcp
599
+
600
+ admin = gcp.organizations.get_iam_policy(bindings=[{
601
+ "role": "roles/editor",
602
+ "members": ["user:jane@example.com"],
603
+ }])
604
+ folder = gcp.folder.IAMPolicy("folder",
605
+ folder="folders/1234567",
606
+ policy_data=admin.policy_data)
607
+ ```
608
+
609
+ With IAM Conditions:
610
+
611
+ ```python
612
+ import pulumi
613
+ import pulumi_gcp as gcp
614
+
615
+ admin = gcp.organizations.get_iam_policy(bindings=[{
616
+ "role": "roles/compute.admin",
617
+ "members": ["user:jane@example.com"],
618
+ "condition": {
619
+ "title": "expires_after_2019_12_31",
620
+ "description": "Expiring at midnight of 2019-12-31",
621
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
622
+ },
623
+ }])
624
+ folder = gcp.folder.IAMPolicy("folder",
625
+ folder="folders/1234567",
626
+ policy_data=admin.policy_data)
627
+ ```
628
+
543
629
  ## folder.IAMBinding
544
630
 
545
631
  ```python
@@ -368,25 +368,6 @@ class BackupPlanIamBinding(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
- ## This resource supports User Project Overrides.
372
-
373
- -
374
-
375
- # IAM policy for Backup for GKE BackupPlan
376
- Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
377
-
378
- * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
379
- * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
380
- * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
381
-
382
- A data source can be used to retrieve policy data in advent you do not need creation
383
-
384
- * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
385
-
386
- > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
387
-
388
- > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
389
-
390
371
  ## gkebackup.BackupPlanIamPolicy
391
372
 
392
373
  ```python
@@ -560,25 +541,6 @@ class BackupPlanIamBinding(pulumi.CustomResource):
560
541
  member="user:jane@example.com")
561
542
  ```
562
543
 
563
- ## This resource supports User Project Overrides.
564
-
565
- -
566
-
567
- # IAM policy for Backup for GKE BackupPlan
568
- Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
569
-
570
- * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
571
- * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
572
- * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
573
-
574
- A data source can be used to retrieve policy data in advent you do not need creation
575
-
576
- * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
577
-
578
- > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
579
-
580
- > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
581
-
582
544
  ## gkebackup.BackupPlanIamPolicy
583
545
 
584
546
  ```python
@@ -368,25 +368,6 @@ class BackupPlanIamMember(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
- ## This resource supports User Project Overrides.
372
-
373
- -
374
-
375
- # IAM policy for Backup for GKE BackupPlan
376
- Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
377
-
378
- * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
379
- * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
380
- * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
381
-
382
- A data source can be used to retrieve policy data in advent you do not need creation
383
-
384
- * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
385
-
386
- > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
387
-
388
- > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
389
-
390
371
  ## gkebackup.BackupPlanIamPolicy
391
372
 
392
373
  ```python
@@ -560,25 +541,6 @@ class BackupPlanIamMember(pulumi.CustomResource):
560
541
  member="user:jane@example.com")
561
542
  ```
562
543
 
563
- ## This resource supports User Project Overrides.
564
-
565
- -
566
-
567
- # IAM policy for Backup for GKE BackupPlan
568
- Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
569
-
570
- * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
571
- * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
572
- * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
573
-
574
- A data source can be used to retrieve policy data in advent you do not need creation
575
-
576
- * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
577
-
578
- > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
579
-
580
- > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
581
-
582
544
  ## gkebackup.BackupPlanIamPolicy
583
545
 
584
546
  ```python
@@ -265,25 +265,6 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
265
265
  member="user:jane@example.com")
266
266
  ```
267
267
 
268
- ## This resource supports User Project Overrides.
269
-
270
- -
271
-
272
- # IAM policy for Backup for GKE BackupPlan
273
- Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
274
-
275
- * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
276
- * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
277
- * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
278
-
279
- A data source can be used to retrieve policy data in advent you do not need creation
280
-
281
- * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
282
-
283
- > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
284
-
285
- > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
286
-
287
268
  ## gkebackup.BackupPlanIamPolicy
288
269
 
289
270
  ```python
@@ -445,25 +426,6 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
445
426
  member="user:jane@example.com")
446
427
  ```
447
428
 
448
- ## This resource supports User Project Overrides.
449
-
450
- -
451
-
452
- # IAM policy for Backup for GKE BackupPlan
453
- Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
454
-
455
- * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
456
- * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
457
- * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
458
-
459
- A data source can be used to retrieve policy data in advent you do not need creation
460
-
461
- * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
462
-
463
- > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
464
-
465
- > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
466
-
467
429
  ## gkebackup.BackupPlanIamPolicy
468
430
 
469
431
  ```python
@@ -368,25 +368,6 @@ class RestorePlanIamBinding(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
- ## This resource supports User Project Overrides.
372
-
373
- -
374
-
375
- # IAM policy for Backup for GKE RestorePlan
376
- Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
377
-
378
- * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
379
- * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
380
- * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
381
-
382
- A data source can be used to retrieve policy data in advent you do not need creation
383
-
384
- * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
385
-
386
- > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
387
-
388
- > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
389
-
390
371
  ## gkebackup.RestorePlanIamPolicy
391
372
 
392
373
  ```python
@@ -560,25 +541,6 @@ class RestorePlanIamBinding(pulumi.CustomResource):
560
541
  member="user:jane@example.com")
561
542
  ```
562
543
 
563
- ## This resource supports User Project Overrides.
564
-
565
- -
566
-
567
- # IAM policy for Backup for GKE RestorePlan
568
- Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
569
-
570
- * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
571
- * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
572
- * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
573
-
574
- A data source can be used to retrieve policy data in advent you do not need creation
575
-
576
- * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
577
-
578
- > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
579
-
580
- > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
581
-
582
544
  ## gkebackup.RestorePlanIamPolicy
583
545
 
584
546
  ```python
@@ -368,25 +368,6 @@ class RestorePlanIamMember(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
- ## This resource supports User Project Overrides.
372
-
373
- -
374
-
375
- # IAM policy for Backup for GKE RestorePlan
376
- Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
377
-
378
- * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
379
- * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
380
- * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
381
-
382
- A data source can be used to retrieve policy data in advent you do not need creation
383
-
384
- * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
385
-
386
- > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
387
-
388
- > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
389
-
390
371
  ## gkebackup.RestorePlanIamPolicy
391
372
 
392
373
  ```python
@@ -560,25 +541,6 @@ class RestorePlanIamMember(pulumi.CustomResource):
560
541
  member="user:jane@example.com")
561
542
  ```
562
543
 
563
- ## This resource supports User Project Overrides.
564
-
565
- -
566
-
567
- # IAM policy for Backup for GKE RestorePlan
568
- Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
569
-
570
- * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
571
- * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
572
- * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
573
-
574
- A data source can be used to retrieve policy data in advent you do not need creation
575
-
576
- * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
577
-
578
- > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
579
-
580
- > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
581
-
582
544
  ## gkebackup.RestorePlanIamPolicy
583
545
 
584
546
  ```python
@@ -265,25 +265,6 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
265
265
  member="user:jane@example.com")
266
266
  ```
267
267
 
268
- ## This resource supports User Project Overrides.
269
-
270
- -
271
-
272
- # IAM policy for Backup for GKE RestorePlan
273
- Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
274
-
275
- * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
276
- * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
277
- * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
278
-
279
- A data source can be used to retrieve policy data in advent you do not need creation
280
-
281
- * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
282
-
283
- > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
284
-
285
- > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
286
-
287
268
  ## gkebackup.RestorePlanIamPolicy
288
269
 
289
270
  ```python
@@ -445,25 +426,6 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
445
426
  member="user:jane@example.com")
446
427
  ```
447
428
 
448
- ## This resource supports User Project Overrides.
449
-
450
- -
451
-
452
- # IAM policy for Backup for GKE RestorePlan
453
- Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
454
-
455
- * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
456
- * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
457
- * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
458
-
459
- A data source can be used to retrieve policy data in advent you do not need creation
460
-
461
- * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
462
-
463
- > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
464
-
465
- > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
466
-
467
429
  ## gkebackup.RestorePlanIamPolicy
468
430
 
469
431
  ```python
@@ -364,25 +364,6 @@ class FeatureIamBinding(pulumi.CustomResource):
364
364
  member="user:jane@example.com")
365
365
  ```
366
366
 
367
- ## This resource supports User Project Overrides.
368
-
369
- -
370
-
371
- # IAM policy for GKEHub Feature
372
- Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
373
-
374
- * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
375
- * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
376
- * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
377
-
378
- A data source can be used to retrieve policy data in advent you do not need creation
379
-
380
- * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
381
-
382
- > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
383
-
384
- > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
385
-
386
367
  ## gkehub.FeatureIamPolicy
387
368
 
388
369
  ```python
@@ -555,25 +536,6 @@ class FeatureIamBinding(pulumi.CustomResource):
555
536
  member="user:jane@example.com")
556
537
  ```
557
538
 
558
- ## This resource supports User Project Overrides.
559
-
560
- -
561
-
562
- # IAM policy for GKEHub Feature
563
- Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
564
-
565
- * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
566
- * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
567
- * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
568
-
569
- A data source can be used to retrieve policy data in advent you do not need creation
570
-
571
- * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
572
-
573
- > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
574
-
575
- > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
576
-
577
539
  ## gkehub.FeatureIamPolicy
578
540
 
579
541
  ```python