pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -407,6 +407,43 @@ class DatabaseIAMMember(pulumi.CustomResource):
407
407
  })
408
408
  ```
409
409
 
410
+ ## spanner.DatabaseIAMPolicy
411
+
412
+ ```python
413
+ import pulumi
414
+ import pulumi_gcp as gcp
415
+
416
+ admin = gcp.organizations.get_iam_policy(bindings=[{
417
+ "role": "roles/editor",
418
+ "members": ["user:jane@example.com"],
419
+ }])
420
+ database = gcp.spanner.DatabaseIAMPolicy("database",
421
+ instance="your-instance-name",
422
+ database="your-database-name",
423
+ policy_data=admin.policy_data)
424
+ ```
425
+
426
+ With IAM Conditions:
427
+
428
+ ```python
429
+ import pulumi
430
+ import pulumi_gcp as gcp
431
+
432
+ admin = gcp.organizations.get_iam_policy(bindings=[{
433
+ "role": "roles/editor",
434
+ "members": ["user:jane@example.com"],
435
+ "condition": {
436
+ "title": "My Role",
437
+ "description": "Grant permissions on my_role",
438
+ "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
439
+ },
440
+ }])
441
+ database = gcp.spanner.DatabaseIAMPolicy("database",
442
+ instance="your-instance-name",
443
+ database="your-database-name",
444
+ policy_data=admin.policy_data)
445
+ ```
446
+
410
447
  ## spanner.DatabaseIAMBinding
411
448
 
412
449
  ```python
@@ -634,6 +671,43 @@ class DatabaseIAMMember(pulumi.CustomResource):
634
671
  })
635
672
  ```
636
673
 
674
+ ## spanner.DatabaseIAMPolicy
675
+
676
+ ```python
677
+ import pulumi
678
+ import pulumi_gcp as gcp
679
+
680
+ admin = gcp.organizations.get_iam_policy(bindings=[{
681
+ "role": "roles/editor",
682
+ "members": ["user:jane@example.com"],
683
+ }])
684
+ database = gcp.spanner.DatabaseIAMPolicy("database",
685
+ instance="your-instance-name",
686
+ database="your-database-name",
687
+ policy_data=admin.policy_data)
688
+ ```
689
+
690
+ With IAM Conditions:
691
+
692
+ ```python
693
+ import pulumi
694
+ import pulumi_gcp as gcp
695
+
696
+ admin = gcp.organizations.get_iam_policy(bindings=[{
697
+ "role": "roles/editor",
698
+ "members": ["user:jane@example.com"],
699
+ "condition": {
700
+ "title": "My Role",
701
+ "description": "Grant permissions on my_role",
702
+ "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
703
+ },
704
+ }])
705
+ database = gcp.spanner.DatabaseIAMPolicy("database",
706
+ instance="your-instance-name",
707
+ database="your-database-name",
708
+ policy_data=admin.policy_data)
709
+ ```
710
+
637
711
  ## spanner.DatabaseIAMBinding
638
712
 
639
713
  ```python
@@ -304,6 +304,43 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
304
304
  })
305
305
  ```
306
306
 
307
+ ## spanner.DatabaseIAMPolicy
308
+
309
+ ```python
310
+ import pulumi
311
+ import pulumi_gcp as gcp
312
+
313
+ admin = gcp.organizations.get_iam_policy(bindings=[{
314
+ "role": "roles/editor",
315
+ "members": ["user:jane@example.com"],
316
+ }])
317
+ database = gcp.spanner.DatabaseIAMPolicy("database",
318
+ instance="your-instance-name",
319
+ database="your-database-name",
320
+ policy_data=admin.policy_data)
321
+ ```
322
+
323
+ With IAM Conditions:
324
+
325
+ ```python
326
+ import pulumi
327
+ import pulumi_gcp as gcp
328
+
329
+ admin = gcp.organizations.get_iam_policy(bindings=[{
330
+ "role": "roles/editor",
331
+ "members": ["user:jane@example.com"],
332
+ "condition": {
333
+ "title": "My Role",
334
+ "description": "Grant permissions on my_role",
335
+ "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
336
+ },
337
+ }])
338
+ database = gcp.spanner.DatabaseIAMPolicy("database",
339
+ instance="your-instance-name",
340
+ database="your-database-name",
341
+ policy_data=admin.policy_data)
342
+ ```
343
+
307
344
  ## spanner.DatabaseIAMBinding
308
345
 
309
346
  ```python
@@ -520,6 +557,43 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
520
557
  })
521
558
  ```
522
559
 
560
+ ## spanner.DatabaseIAMPolicy
561
+
562
+ ```python
563
+ import pulumi
564
+ import pulumi_gcp as gcp
565
+
566
+ admin = gcp.organizations.get_iam_policy(bindings=[{
567
+ "role": "roles/editor",
568
+ "members": ["user:jane@example.com"],
569
+ }])
570
+ database = gcp.spanner.DatabaseIAMPolicy("database",
571
+ instance="your-instance-name",
572
+ database="your-database-name",
573
+ policy_data=admin.policy_data)
574
+ ```
575
+
576
+ With IAM Conditions:
577
+
578
+ ```python
579
+ import pulumi
580
+ import pulumi_gcp as gcp
581
+
582
+ admin = gcp.organizations.get_iam_policy(bindings=[{
583
+ "role": "roles/editor",
584
+ "members": ["user:jane@example.com"],
585
+ "condition": {
586
+ "title": "My Role",
587
+ "description": "Grant permissions on my_role",
588
+ "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
589
+ },
590
+ }])
591
+ database = gcp.spanner.DatabaseIAMPolicy("database",
592
+ instance="your-instance-name",
593
+ database="your-database-name",
594
+ policy_data=admin.policy_data)
595
+ ```
596
+
523
597
  ## spanner.DatabaseIAMBinding
524
598
 
525
599
  ```python
@@ -303,6 +303,21 @@ class InstanceIAMBinding(pulumi.CustomResource):
303
303
  member="user:jane@example.com")
304
304
  ```
305
305
 
306
+ ## spanner.InstanceIAMPolicy
307
+
308
+ ```python
309
+ import pulumi
310
+ import pulumi_gcp as gcp
311
+
312
+ admin = gcp.organizations.get_iam_policy(bindings=[{
313
+ "role": "roles/editor",
314
+ "members": ["user:jane@example.com"],
315
+ }])
316
+ instance = gcp.spanner.InstanceIAMPolicy("instance",
317
+ instance="your-instance-name",
318
+ policy_data=admin.policy_data)
319
+ ```
320
+
306
321
  ## spanner.InstanceIAMBinding
307
322
 
308
323
  ```python
@@ -429,6 +444,21 @@ class InstanceIAMBinding(pulumi.CustomResource):
429
444
  member="user:jane@example.com")
430
445
  ```
431
446
 
447
+ ## spanner.InstanceIAMPolicy
448
+
449
+ ```python
450
+ import pulumi
451
+ import pulumi_gcp as gcp
452
+
453
+ admin = gcp.organizations.get_iam_policy(bindings=[{
454
+ "role": "roles/editor",
455
+ "members": ["user:jane@example.com"],
456
+ }])
457
+ instance = gcp.spanner.InstanceIAMPolicy("instance",
458
+ instance="your-instance-name",
459
+ policy_data=admin.policy_data)
460
+ ```
461
+
432
462
  ## spanner.InstanceIAMBinding
433
463
 
434
464
  ```python
@@ -303,6 +303,21 @@ class InstanceIAMMember(pulumi.CustomResource):
303
303
  member="user:jane@example.com")
304
304
  ```
305
305
 
306
+ ## spanner.InstanceIAMPolicy
307
+
308
+ ```python
309
+ import pulumi
310
+ import pulumi_gcp as gcp
311
+
312
+ admin = gcp.organizations.get_iam_policy(bindings=[{
313
+ "role": "roles/editor",
314
+ "members": ["user:jane@example.com"],
315
+ }])
316
+ instance = gcp.spanner.InstanceIAMPolicy("instance",
317
+ instance="your-instance-name",
318
+ policy_data=admin.policy_data)
319
+ ```
320
+
306
321
  ## spanner.InstanceIAMBinding
307
322
 
308
323
  ```python
@@ -429,6 +444,21 @@ class InstanceIAMMember(pulumi.CustomResource):
429
444
  member="user:jane@example.com")
430
445
  ```
431
446
 
447
+ ## spanner.InstanceIAMPolicy
448
+
449
+ ```python
450
+ import pulumi
451
+ import pulumi_gcp as gcp
452
+
453
+ admin = gcp.organizations.get_iam_policy(bindings=[{
454
+ "role": "roles/editor",
455
+ "members": ["user:jane@example.com"],
456
+ }])
457
+ instance = gcp.spanner.InstanceIAMPolicy("instance",
458
+ instance="your-instance-name",
459
+ policy_data=admin.policy_data)
460
+ ```
461
+
432
462
  ## spanner.InstanceIAMBinding
433
463
 
434
464
  ```python
@@ -212,6 +212,21 @@ class InstanceIAMPolicy(pulumi.CustomResource):
212
212
  member="user:jane@example.com")
213
213
  ```
214
214
 
215
+ ## spanner.InstanceIAMPolicy
216
+
217
+ ```python
218
+ import pulumi
219
+ import pulumi_gcp as gcp
220
+
221
+ admin = gcp.organizations.get_iam_policy(bindings=[{
222
+ "role": "roles/editor",
223
+ "members": ["user:jane@example.com"],
224
+ }])
225
+ instance = gcp.spanner.InstanceIAMPolicy("instance",
226
+ instance="your-instance-name",
227
+ policy_data=admin.policy_data)
228
+ ```
229
+
215
230
  ## spanner.InstanceIAMBinding
216
231
 
217
232
  ```python
@@ -329,6 +344,21 @@ class InstanceIAMPolicy(pulumi.CustomResource):
329
344
  member="user:jane@example.com")
330
345
  ```
331
346
 
347
+ ## spanner.InstanceIAMPolicy
348
+
349
+ ```python
350
+ import pulumi
351
+ import pulumi_gcp as gcp
352
+
353
+ admin = gcp.organizations.get_iam_policy(bindings=[{
354
+ "role": "roles/editor",
355
+ "members": ["user:jane@example.com"],
356
+ }])
357
+ instance = gcp.spanner.InstanceIAMPolicy("instance",
358
+ instance="your-instance-name",
359
+ policy_data=admin.policy_data)
360
+ ```
361
+
332
362
  ## spanner.InstanceIAMBinding
333
363
 
334
364
  ```python
@@ -345,27 +345,6 @@ class BucketIAMBinding(pulumi.CustomResource):
345
345
  })
346
346
  ```
347
347
 
348
- ## This resource supports User Project Overrides.
349
-
350
- -
351
-
352
- # IAM policy for Cloud Storage Bucket
353
- Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
354
-
355
- * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
356
- * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
357
- * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
358
-
359
- A data source can be used to retrieve policy data in advent you do not need creation
360
-
361
- * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
362
-
363
- > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
364
-
365
- > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
366
-
367
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
368
-
369
348
  ## storage.BucketIAMPolicy
370
349
 
371
350
  ```python
@@ -625,27 +604,6 @@ class BucketIAMBinding(pulumi.CustomResource):
625
604
  })
626
605
  ```
627
606
 
628
- ## This resource supports User Project Overrides.
629
-
630
- -
631
-
632
- # IAM policy for Cloud Storage Bucket
633
- Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
634
-
635
- * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
636
- * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
637
- * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
638
-
639
- A data source can be used to retrieve policy data in advent you do not need creation
640
-
641
- * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
642
-
643
- > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
644
-
645
- > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
646
-
647
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
648
-
649
607
  ## storage.BucketIAMPolicy
650
608
 
651
609
  ```python
@@ -345,27 +345,6 @@ class BucketIAMMember(pulumi.CustomResource):
345
345
  })
346
346
  ```
347
347
 
348
- ## This resource supports User Project Overrides.
349
-
350
- -
351
-
352
- # IAM policy for Cloud Storage Bucket
353
- Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
354
-
355
- * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
356
- * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
357
- * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
358
-
359
- A data source can be used to retrieve policy data in advent you do not need creation
360
-
361
- * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
362
-
363
- > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
364
-
365
- > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
366
-
367
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
368
-
369
348
  ## storage.BucketIAMPolicy
370
349
 
371
350
  ```python
@@ -625,27 +604,6 @@ class BucketIAMMember(pulumi.CustomResource):
625
604
  })
626
605
  ```
627
606
 
628
- ## This resource supports User Project Overrides.
629
-
630
- -
631
-
632
- # IAM policy for Cloud Storage Bucket
633
- Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
634
-
635
- * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
636
- * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
637
- * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
638
-
639
- A data source can be used to retrieve policy data in advent you do not need creation
640
-
641
- * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
642
-
643
- > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
644
-
645
- > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
646
-
647
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
648
-
649
607
  ## storage.BucketIAMPolicy
650
608
 
651
609
  ```python
@@ -230,27 +230,6 @@ class BucketIAMPolicy(pulumi.CustomResource):
230
230
  })
231
231
  ```
232
232
 
233
- ## This resource supports User Project Overrides.
234
-
235
- -
236
-
237
- # IAM policy for Cloud Storage Bucket
238
- Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
239
-
240
- * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
241
- * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
242
- * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
243
-
244
- A data source can be used to retrieve policy data in advent you do not need creation
245
-
246
- * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
247
-
248
- > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
249
-
250
- > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
251
-
252
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
253
-
254
233
  ## storage.BucketIAMPolicy
255
234
 
256
235
  ```python
@@ -496,27 +475,6 @@ class BucketIAMPolicy(pulumi.CustomResource):
496
475
  })
497
476
  ```
498
477
 
499
- ## This resource supports User Project Overrides.
500
-
501
- -
502
-
503
- # IAM policy for Cloud Storage Bucket
504
- Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
505
-
506
- * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
507
- * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
508
- * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
509
-
510
- A data source can be used to retrieve policy data in advent you do not need creation
511
-
512
- * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
513
-
514
- > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
515
-
516
- > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
517
-
518
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
519
-
520
478
  ## storage.BucketIAMPolicy
521
479
 
522
480
  ```python
@@ -383,28 +383,6 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
383
383
  })
384
384
  ```
385
385
 
386
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
387
-
388
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
389
- ---
390
-
391
- # IAM policy for Cloud Storage ManagedFolder
392
- Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
393
-
394
- * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
395
- * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
396
- * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
397
-
398
- A data source can be used to retrieve policy data in advent you do not need creation
399
-
400
- * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
401
-
402
- > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
403
-
404
- > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
405
-
406
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
407
-
408
386
  ## storage.ManagedFolderIamPolicy
409
387
 
410
388
  ```python
@@ -677,28 +655,6 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
677
655
  })
678
656
  ```
679
657
 
680
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
681
-
682
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
683
- ---
684
-
685
- # IAM policy for Cloud Storage ManagedFolder
686
- Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
687
-
688
- * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
689
- * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
690
- * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
691
-
692
- A data source can be used to retrieve policy data in advent you do not need creation
693
-
694
- * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
695
-
696
- > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
697
-
698
- > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
699
-
700
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
701
-
702
658
  ## storage.ManagedFolderIamPolicy
703
659
 
704
660
  ```python
@@ -383,28 +383,6 @@ class ManagedFolderIamMember(pulumi.CustomResource):
383
383
  })
384
384
  ```
385
385
 
386
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
387
-
388
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
389
- ---
390
-
391
- # IAM policy for Cloud Storage ManagedFolder
392
- Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
393
-
394
- * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
395
- * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
396
- * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
397
-
398
- A data source can be used to retrieve policy data in advent you do not need creation
399
-
400
- * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
401
-
402
- > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
403
-
404
- > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
405
-
406
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
407
-
408
386
  ## storage.ManagedFolderIamPolicy
409
387
 
410
388
  ```python
@@ -677,28 +655,6 @@ class ManagedFolderIamMember(pulumi.CustomResource):
677
655
  })
678
656
  ```
679
657
 
680
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
681
-
682
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
683
- ---
684
-
685
- # IAM policy for Cloud Storage ManagedFolder
686
- Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
687
-
688
- * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
689
- * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
690
- * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
691
-
692
- A data source can be used to retrieve policy data in advent you do not need creation
693
-
694
- * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
695
-
696
- > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
697
-
698
- > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
699
-
700
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
701
-
702
658
  ## storage.ManagedFolderIamPolicy
703
659
 
704
660
  ```python
@@ -268,28 +268,6 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
268
268
  })
269
269
  ```
270
270
 
271
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
272
-
273
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
274
- ---
275
-
276
- # IAM policy for Cloud Storage ManagedFolder
277
- Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
278
-
279
- * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
280
- * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
281
- * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
282
-
283
- A data source can be used to retrieve policy data in advent you do not need creation
284
-
285
- * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
286
-
287
- > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
288
-
289
- > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
290
-
291
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
292
-
293
271
  ## storage.ManagedFolderIamPolicy
294
272
 
295
273
  ```python
@@ -548,28 +526,6 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
548
526
  })
549
527
  ```
550
528
 
551
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
552
-
553
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
554
- ---
555
-
556
- # IAM policy for Cloud Storage ManagedFolder
557
- Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
558
-
559
- * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
560
- * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
561
- * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
562
-
563
- A data source can be used to retrieve policy data in advent you do not need creation
564
-
565
- * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
566
-
567
- > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
568
-
569
- > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
570
-
571
- > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
572
-
573
529
  ## storage.ManagedFolderIamPolicy
574
530
 
575
531
  ```python