pulumi-gcp 7.36.0__py3-none-any.whl → 7.36.0a1723105270__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-gcp might be problematic. Click here for more details.

Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +0 -40
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +0 -40
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +0 -40
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +0 -38
  5. pulumi_gcp/apigateway/api_config_iam_member.py +0 -38
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +0 -38
  7. pulumi_gcp/apigateway/api_iam_binding.py +0 -38
  8. pulumi_gcp/apigateway/api_iam_member.py +0 -38
  9. pulumi_gcp/apigateway/api_iam_policy.py +0 -38
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +0 -38
  11. pulumi_gcp/apigateway/gateway_iam_member.py +0 -38
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +0 -38
  13. pulumi_gcp/apigee/environment_iam_binding.py +0 -40
  14. pulumi_gcp/apigee/environment_iam_member.py +0 -40
  15. pulumi_gcp/apigee/environment_iam_policy.py +0 -40
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +0 -38
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +0 -38
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +0 -38
  19. pulumi_gcp/bigquery/connection_iam_binding.py +0 -38
  20. pulumi_gcp/bigquery/connection_iam_member.py +0 -38
  21. pulumi_gcp/bigquery/connection_iam_policy.py +0 -38
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +32 -0
  23. pulumi_gcp/bigquery/dataset_iam_member.py +32 -0
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +32 -0
  25. pulumi_gcp/bigquery/iam_binding.py +0 -42
  26. pulumi_gcp/bigquery/iam_member.py +0 -42
  27. pulumi_gcp/bigquery/iam_policy.py +0 -42
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +0 -38
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +0 -38
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +0 -38
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +0 -38
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +0 -38
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +0 -38
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +0 -38
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +0 -38
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +0 -38
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +0 -38
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +0 -38
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +0 -38
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +0 -42
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +0 -42
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +0 -42
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +0 -42
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +0 -42
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +0 -42
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +0 -38
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +0 -38
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +0 -38
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +0 -38
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +0 -38
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +0 -38
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +0 -38
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +0 -38
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +0 -38
  55. pulumi_gcp/cloudrun/iam_binding.py +0 -38
  56. pulumi_gcp/cloudrun/iam_member.py +0 -38
  57. pulumi_gcp/cloudrun/iam_policy.py +0 -38
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +0 -38
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +0 -38
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +0 -38
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +0 -38
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +0 -38
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +0 -38
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +0 -38
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +0 -38
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +0 -38
  67. pulumi_gcp/compute/disk_iam_binding.py +0 -38
  68. pulumi_gcp/compute/disk_iam_member.py +0 -38
  69. pulumi_gcp/compute/disk_iam_policy.py +0 -38
  70. pulumi_gcp/compute/image_iam_binding.py +0 -42
  71. pulumi_gcp/compute/image_iam_member.py +0 -42
  72. pulumi_gcp/compute/image_iam_policy.py +0 -42
  73. pulumi_gcp/compute/instance_iam_binding.py +0 -42
  74. pulumi_gcp/compute/instance_iam_member.py +0 -42
  75. pulumi_gcp/compute/instance_iam_policy.py +0 -42
  76. pulumi_gcp/compute/machine_image_iam_binding.py +0 -40
  77. pulumi_gcp/compute/machine_image_iam_member.py +0 -40
  78. pulumi_gcp/compute/machine_image_iam_policy.py +0 -40
  79. pulumi_gcp/compute/region_disk_iam_binding.py +0 -38
  80. pulumi_gcp/compute/region_disk_iam_member.py +0 -38
  81. pulumi_gcp/compute/region_disk_iam_policy.py +0 -38
  82. pulumi_gcp/compute/snapshot_iam_binding.py +0 -38
  83. pulumi_gcp/compute/snapshot_iam_member.py +0 -38
  84. pulumi_gcp/compute/snapshot_iam_policy.py +0 -38
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +0 -42
  86. pulumi_gcp/compute/subnetwork_iam_member.py +0 -42
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +0 -42
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +0 -38
  89. pulumi_gcp/containeranalysis/note_iam_member.py +0 -38
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +0 -38
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +0 -38
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +0 -38
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +0 -38
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +0 -40
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +0 -40
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +0 -40
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +0 -38
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +0 -38
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +0 -38
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +0 -38
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +0 -38
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +0 -38
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +0 -38
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +0 -38
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +0 -38
  106. pulumi_gcp/dataplex/asset_iam_binding.py +0 -38
  107. pulumi_gcp/dataplex/asset_iam_member.py +0 -38
  108. pulumi_gcp/dataplex/asset_iam_policy.py +0 -38
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +0 -38
  110. pulumi_gcp/dataplex/datascan_iam_member.py +0 -38
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +0 -38
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +0 -38
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +0 -38
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +0 -38
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +0 -38
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +0 -38
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +0 -38
  118. pulumi_gcp/dataplex/lake_iam_binding.py +0 -38
  119. pulumi_gcp/dataplex/lake_iam_member.py +0 -38
  120. pulumi_gcp/dataplex/lake_iam_policy.py +0 -38
  121. pulumi_gcp/dataplex/task_iam_binding.py +0 -38
  122. pulumi_gcp/dataplex/task_iam_member.py +0 -38
  123. pulumi_gcp/dataplex/task_iam_policy.py +0 -38
  124. pulumi_gcp/dataplex/zone_iam_binding.py +0 -38
  125. pulumi_gcp/dataplex/zone_iam_member.py +0 -38
  126. pulumi_gcp/dataplex/zone_iam_policy.py +0 -38
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +0 -38
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +0 -38
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +0 -38
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +0 -38
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +0 -38
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -38
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +0 -38
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +0 -38
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +0 -38
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +0 -38
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +0 -38
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +0 -38
  139. pulumi_gcp/endpoints/service_iam_binding.py +0 -40
  140. pulumi_gcp/endpoints/service_iam_member.py +0 -40
  141. pulumi_gcp/endpoints/service_iam_policy.py +0 -40
  142. pulumi_gcp/folder/iam_audit_config.py +86 -0
  143. pulumi_gcp/folder/iam_member.py +86 -0
  144. pulumi_gcp/folder/iam_policy.py +86 -0
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +0 -38
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +0 -38
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +0 -38
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +0 -38
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +0 -38
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +0 -38
  151. pulumi_gcp/gkehub/feature_iam_binding.py +0 -38
  152. pulumi_gcp/gkehub/feature_iam_member.py +0 -38
  153. pulumi_gcp/gkehub/feature_iam_policy.py +0 -38
  154. pulumi_gcp/gkehub/membership_iam_binding.py +0 -38
  155. pulumi_gcp/gkehub/membership_iam_member.py +0 -38
  156. pulumi_gcp/gkehub/membership_iam_policy.py +0 -38
  157. pulumi_gcp/gkehub/scope_iam_binding.py +0 -38
  158. pulumi_gcp/gkehub/scope_iam_member.py +0 -38
  159. pulumi_gcp/gkehub/scope_iam_policy.py +0 -38
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +0 -40
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +0 -40
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +0 -40
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +30 -0
  164. pulumi_gcp/healthcare/dataset_iam_member.py +30 -0
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +30 -0
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +30 -0
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +30 -0
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +30 -0
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +30 -0
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +30 -0
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +30 -0
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +30 -0
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +30 -0
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +30 -0
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +0 -42
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +0 -42
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +0 -42
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +0 -42
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +0 -42
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +0 -42
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +0 -42
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +0 -42
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +0 -42
  184. pulumi_gcp/iap/tunnel_iam_binding.py +0 -42
  185. pulumi_gcp/iap/tunnel_iam_member.py +0 -42
  186. pulumi_gcp/iap/tunnel_iam_policy.py +0 -42
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +0 -42
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +0 -42
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +0 -42
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +0 -42
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +0 -42
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +0 -42
  193. pulumi_gcp/iap/web_iam_binding.py +0 -42
  194. pulumi_gcp/iap/web_iam_member.py +0 -42
  195. pulumi_gcp/iap/web_iam_policy.py +0 -42
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +0 -42
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +0 -42
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +0 -42
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +0 -42
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +0 -42
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +0 -42
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +0 -42
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +0 -42
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +0 -42
  205. pulumi_gcp/kms/key_ring_iam_binding.py +82 -0
  206. pulumi_gcp/kms/key_ring_iam_member.py +82 -0
  207. pulumi_gcp/kms/key_ring_iam_policy.py +82 -0
  208. pulumi_gcp/notebooks/instance_iam_binding.py +0 -38
  209. pulumi_gcp/notebooks/instance_iam_member.py +0 -38
  210. pulumi_gcp/notebooks/instance_iam_policy.py +0 -38
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +0 -38
  212. pulumi_gcp/notebooks/runtime_iam_member.py +0 -38
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +0 -38
  214. pulumi_gcp/organizations/iam_member.py +94 -0
  215. pulumi_gcp/organizations/iam_policy.py +94 -0
  216. pulumi_gcp/pubsub/schema_iam_binding.py +0 -38
  217. pulumi_gcp/pubsub/schema_iam_member.py +0 -38
  218. pulumi_gcp/pubsub/schema_iam_policy.py +0 -38
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +30 -0
  220. pulumi_gcp/pubsub/subscription_iam_member.py +30 -0
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +30 -0
  222. pulumi_gcp/pubsub/topic_iam_binding.py +0 -38
  223. pulumi_gcp/pubsub/topic_iam_member.py +0 -38
  224. pulumi_gcp/pubsub/topic_iam_policy.py +0 -38
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +0 -42
  227. pulumi_gcp/secretmanager/secret_iam_member.py +0 -42
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +0 -42
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +0 -38
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +0 -38
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +0 -38
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +0 -40
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +0 -40
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +0 -40
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +0 -40
  238. pulumi_gcp/servicedirectory/service_iam_member.py +0 -40
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +0 -40
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +0 -38
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +0 -38
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +0 -38
  243. pulumi_gcp/spanner/database_iam_binding.py +74 -0
  244. pulumi_gcp/spanner/database_iam_member.py +74 -0
  245. pulumi_gcp/spanner/database_iam_policy.py +74 -0
  246. pulumi_gcp/spanner/instance_iam_binding.py +30 -0
  247. pulumi_gcp/spanner/instance_iam_member.py +30 -0
  248. pulumi_gcp/spanner/instance_iam_policy.py +30 -0
  249. pulumi_gcp/storage/bucket_iam_binding.py +0 -42
  250. pulumi_gcp/storage/bucket_iam_member.py +0 -42
  251. pulumi_gcp/storage/bucket_iam_policy.py +0 -42
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -44
  253. pulumi_gcp/storage/managed_folder_iam_member.py +0 -44
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -44
  255. pulumi_gcp/tags/tag_key_iam_binding.py +0 -40
  256. pulumi_gcp/tags/tag_key_iam_member.py +0 -40
  257. pulumi_gcp/tags/tag_key_iam_policy.py +0 -40
  258. pulumi_gcp/tags/tag_value_iam_binding.py +0 -40
  259. pulumi_gcp/tags/tag_value_iam_member.py +0 -40
  260. pulumi_gcp/tags/tag_value_iam_policy.py +0 -40
  261. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0.dist-info → pulumi_gcp-7.36.0a1723105270.dist-info}/top_level.txt +0 -0
@@ -279,26 +279,6 @@ class PolicyTagIamMember(pulumi.CustomResource):
279
279
  member="user:jane@example.com")
280
280
  ```
281
281
 
282
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
283
-
284
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
285
- ---
286
-
287
- # IAM policy for Data catalog PolicyTag
288
- Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
289
-
290
- * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
291
- * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
292
- * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
293
-
294
- A data source can be used to retrieve policy data in advent you do not need creation
295
-
296
- * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
297
-
298
- > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
299
-
300
- > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
301
-
302
282
  ## datacatalog.PolicyTagIamPolicy
303
283
 
304
284
  ```python
@@ -448,26 +428,6 @@ class PolicyTagIamMember(pulumi.CustomResource):
448
428
  member="user:jane@example.com")
449
429
  ```
450
430
 
451
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
452
-
453
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
454
- ---
455
-
456
- # IAM policy for Data catalog PolicyTag
457
- Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
458
-
459
- * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
460
- * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
461
- * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
462
-
463
- A data source can be used to retrieve policy data in advent you do not need creation
464
-
465
- * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
466
-
467
- > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
468
-
469
- > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
470
-
471
431
  ## datacatalog.PolicyTagIamPolicy
472
432
 
473
433
  ```python
@@ -176,26 +176,6 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
176
176
  member="user:jane@example.com")
177
177
  ```
178
178
 
179
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
180
-
181
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
182
- ---
183
-
184
- # IAM policy for Data catalog PolicyTag
185
- Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
186
-
187
- * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
188
- * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
189
- * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
190
-
191
- A data source can be used to retrieve policy data in advent you do not need creation
192
-
193
- * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
194
-
195
- > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
196
-
197
- > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
198
-
199
179
  ## datacatalog.PolicyTagIamPolicy
200
180
 
201
181
  ```python
@@ -333,26 +313,6 @@ class PolicyTagIamPolicy(pulumi.CustomResource):
333
313
  member="user:jane@example.com")
334
314
  ```
335
315
 
336
- ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
337
-
338
- full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
339
- ---
340
-
341
- # IAM policy for Data catalog PolicyTag
342
- Three different resources help you manage your IAM policy for Data catalog PolicyTag. Each of these resources serves a different use case:
343
-
344
- * `datacatalog.PolicyTagIamPolicy`: Authoritative. Sets the IAM policy for the policytag and replaces any existing policy already attached.
345
- * `datacatalog.PolicyTagIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the policytag are preserved.
346
- * `datacatalog.PolicyTagIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the policytag are preserved.
347
-
348
- A data source can be used to retrieve policy data in advent you do not need creation
349
-
350
- * `datacatalog.PolicyTagIamPolicy`: Retrieves the IAM policy for the policytag
351
-
352
- > **Note:** `datacatalog.PolicyTagIamPolicy` **cannot** be used in conjunction with `datacatalog.PolicyTagIamBinding` and `datacatalog.PolicyTagIamMember` or they will fight over what your policy should be.
353
-
354
- > **Note:** `datacatalog.PolicyTagIamBinding` resources **can be** used in conjunction with `datacatalog.PolicyTagIamMember` resources **only if** they do not grant privilege to the same role.
355
-
356
316
  ## datacatalog.PolicyTagIamPolicy
357
317
 
358
318
  ```python
@@ -341,25 +341,6 @@ class TagTemplateIamBinding(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
- ## This resource supports User Project Overrides.
345
-
346
- -
347
-
348
- # IAM policy for Data catalog TagTemplate
349
- Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
350
-
351
- * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
352
- * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
353
- * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
354
-
355
- A data source can be used to retrieve policy data in advent you do not need creation
356
-
357
- * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
358
-
359
- > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
360
-
361
- > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
362
-
363
344
  ## datacatalog.TagTemplateIamPolicy
364
345
 
365
346
  ```python
@@ -517,25 +498,6 @@ class TagTemplateIamBinding(pulumi.CustomResource):
517
498
  member="user:jane@example.com")
518
499
  ```
519
500
 
520
- ## This resource supports User Project Overrides.
521
-
522
- -
523
-
524
- # IAM policy for Data catalog TagTemplate
525
- Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
526
-
527
- * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
528
- * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
529
- * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
530
-
531
- A data source can be used to retrieve policy data in advent you do not need creation
532
-
533
- * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
534
-
535
- > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
536
-
537
- > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
538
-
539
501
  ## datacatalog.TagTemplateIamPolicy
540
502
 
541
503
  ```python
@@ -341,25 +341,6 @@ class TagTemplateIamMember(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
- ## This resource supports User Project Overrides.
345
-
346
- -
347
-
348
- # IAM policy for Data catalog TagTemplate
349
- Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
350
-
351
- * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
352
- * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
353
- * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
354
-
355
- A data source can be used to retrieve policy data in advent you do not need creation
356
-
357
- * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
358
-
359
- > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
360
-
361
- > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
362
-
363
344
  ## datacatalog.TagTemplateIamPolicy
364
345
 
365
346
  ```python
@@ -517,25 +498,6 @@ class TagTemplateIamMember(pulumi.CustomResource):
517
498
  member="user:jane@example.com")
518
499
  ```
519
500
 
520
- ## This resource supports User Project Overrides.
521
-
522
- -
523
-
524
- # IAM policy for Data catalog TagTemplate
525
- Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
526
-
527
- * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
528
- * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
529
- * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
530
-
531
- A data source can be used to retrieve policy data in advent you do not need creation
532
-
533
- * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
534
-
535
- > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
536
-
537
- > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
538
-
539
501
  ## datacatalog.TagTemplateIamPolicy
540
502
 
541
503
  ```python
@@ -238,25 +238,6 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
238
238
  member="user:jane@example.com")
239
239
  ```
240
240
 
241
- ## This resource supports User Project Overrides.
242
-
243
- -
244
-
245
- # IAM policy for Data catalog TagTemplate
246
- Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
247
-
248
- * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
249
- * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
250
- * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
251
-
252
- A data source can be used to retrieve policy data in advent you do not need creation
253
-
254
- * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
255
-
256
- > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
257
-
258
- > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
259
-
260
241
  ## datacatalog.TagTemplateIamPolicy
261
242
 
262
243
  ```python
@@ -402,25 +383,6 @@ class TagTemplateIamPolicy(pulumi.CustomResource):
402
383
  member="user:jane@example.com")
403
384
  ```
404
385
 
405
- ## This resource supports User Project Overrides.
406
-
407
- -
408
-
409
- # IAM policy for Data catalog TagTemplate
410
- Three different resources help you manage your IAM policy for Data catalog TagTemplate. Each of these resources serves a different use case:
411
-
412
- * `datacatalog.TagTemplateIamPolicy`: Authoritative. Sets the IAM policy for the tagtemplate and replaces any existing policy already attached.
413
- * `datacatalog.TagTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the tagtemplate are preserved.
414
- * `datacatalog.TagTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the tagtemplate are preserved.
415
-
416
- A data source can be used to retrieve policy data in advent you do not need creation
417
-
418
- * `datacatalog.TagTemplateIamPolicy`: Retrieves the IAM policy for the tagtemplate
419
-
420
- > **Note:** `datacatalog.TagTemplateIamPolicy` **cannot** be used in conjunction with `datacatalog.TagTemplateIamBinding` and `datacatalog.TagTemplateIamMember` or they will fight over what your policy should be.
421
-
422
- > **Note:** `datacatalog.TagTemplateIamBinding` resources **can be** used in conjunction with `datacatalog.TagTemplateIamMember` resources **only if** they do not grant privilege to the same role.
423
-
424
386
  ## datacatalog.TagTemplateIamPolicy
425
387
 
426
388
  ```python
@@ -341,25 +341,6 @@ class TaxonomyIamBinding(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
- ## This resource supports User Project Overrides.
345
-
346
- -
347
-
348
- # IAM policy for Data catalog Taxonomy
349
- Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
350
-
351
- * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
352
- * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
353
- * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
354
-
355
- A data source can be used to retrieve policy data in advent you do not need creation
356
-
357
- * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
358
-
359
- > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
360
-
361
- > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
362
-
363
344
  ## datacatalog.TaxonomyIamPolicy
364
345
 
365
346
  ```python
@@ -517,25 +498,6 @@ class TaxonomyIamBinding(pulumi.CustomResource):
517
498
  member="user:jane@example.com")
518
499
  ```
519
500
 
520
- ## This resource supports User Project Overrides.
521
-
522
- -
523
-
524
- # IAM policy for Data catalog Taxonomy
525
- Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
526
-
527
- * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
528
- * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
529
- * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
530
-
531
- A data source can be used to retrieve policy data in advent you do not need creation
532
-
533
- * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
534
-
535
- > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
536
-
537
- > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
538
-
539
501
  ## datacatalog.TaxonomyIamPolicy
540
502
 
541
503
  ```python
@@ -341,25 +341,6 @@ class TaxonomyIamMember(pulumi.CustomResource):
341
341
  member="user:jane@example.com")
342
342
  ```
343
343
 
344
- ## This resource supports User Project Overrides.
345
-
346
- -
347
-
348
- # IAM policy for Data catalog Taxonomy
349
- Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
350
-
351
- * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
352
- * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
353
- * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
354
-
355
- A data source can be used to retrieve policy data in advent you do not need creation
356
-
357
- * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
358
-
359
- > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
360
-
361
- > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
362
-
363
344
  ## datacatalog.TaxonomyIamPolicy
364
345
 
365
346
  ```python
@@ -517,25 +498,6 @@ class TaxonomyIamMember(pulumi.CustomResource):
517
498
  member="user:jane@example.com")
518
499
  ```
519
500
 
520
- ## This resource supports User Project Overrides.
521
-
522
- -
523
-
524
- # IAM policy for Data catalog Taxonomy
525
- Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
526
-
527
- * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
528
- * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
529
- * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
530
-
531
- A data source can be used to retrieve policy data in advent you do not need creation
532
-
533
- * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
534
-
535
- > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
536
-
537
- > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
538
-
539
501
  ## datacatalog.TaxonomyIamPolicy
540
502
 
541
503
  ```python
@@ -238,25 +238,6 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
238
238
  member="user:jane@example.com")
239
239
  ```
240
240
 
241
- ## This resource supports User Project Overrides.
242
-
243
- -
244
-
245
- # IAM policy for Data catalog Taxonomy
246
- Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
247
-
248
- * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
249
- * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
250
- * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
251
-
252
- A data source can be used to retrieve policy data in advent you do not need creation
253
-
254
- * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
255
-
256
- > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
257
-
258
- > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
259
-
260
241
  ## datacatalog.TaxonomyIamPolicy
261
242
 
262
243
  ```python
@@ -402,25 +383,6 @@ class TaxonomyIamPolicy(pulumi.CustomResource):
402
383
  member="user:jane@example.com")
403
384
  ```
404
385
 
405
- ## This resource supports User Project Overrides.
406
-
407
- -
408
-
409
- # IAM policy for Data catalog Taxonomy
410
- Three different resources help you manage your IAM policy for Data catalog Taxonomy. Each of these resources serves a different use case:
411
-
412
- * `datacatalog.TaxonomyIamPolicy`: Authoritative. Sets the IAM policy for the taxonomy and replaces any existing policy already attached.
413
- * `datacatalog.TaxonomyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the taxonomy are preserved.
414
- * `datacatalog.TaxonomyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the taxonomy are preserved.
415
-
416
- A data source can be used to retrieve policy data in advent you do not need creation
417
-
418
- * `datacatalog.TaxonomyIamPolicy`: Retrieves the IAM policy for the taxonomy
419
-
420
- > **Note:** `datacatalog.TaxonomyIamPolicy` **cannot** be used in conjunction with `datacatalog.TaxonomyIamBinding` and `datacatalog.TaxonomyIamMember` or they will fight over what your policy should be.
421
-
422
- > **Note:** `datacatalog.TaxonomyIamBinding` resources **can be** used in conjunction with `datacatalog.TaxonomyIamMember` resources **only if** they do not grant privilege to the same role.
423
-
424
386
  ## datacatalog.TaxonomyIamPolicy
425
387
 
426
388
  ```python
@@ -359,25 +359,6 @@ class AspectTypeIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
- ## This resource supports User Project Overrides.
363
-
364
- -
365
-
366
- # IAM policy for Dataplex AspectType
367
- Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
368
-
369
- * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
370
- * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
371
- * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
372
-
373
- A data source can be used to retrieve policy data in advent you do not need creation
374
-
375
- * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
376
-
377
- > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
378
-
379
- > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
380
-
381
362
  ## dataplex.AspectTypeIamPolicy
382
363
 
383
364
  ```python
@@ -550,25 +531,6 @@ class AspectTypeIamBinding(pulumi.CustomResource):
550
531
  member="user:jane@example.com")
551
532
  ```
552
533
 
553
- ## This resource supports User Project Overrides.
554
-
555
- -
556
-
557
- # IAM policy for Dataplex AspectType
558
- Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
559
-
560
- * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
561
- * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
562
- * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
563
-
564
- A data source can be used to retrieve policy data in advent you do not need creation
565
-
566
- * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
567
-
568
- > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
569
-
570
- > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
571
-
572
534
  ## dataplex.AspectTypeIamPolicy
573
535
 
574
536
  ```python
@@ -359,25 +359,6 @@ class AspectTypeIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
- ## This resource supports User Project Overrides.
363
-
364
- -
365
-
366
- # IAM policy for Dataplex AspectType
367
- Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
368
-
369
- * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
370
- * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
371
- * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
372
-
373
- A data source can be used to retrieve policy data in advent you do not need creation
374
-
375
- * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
376
-
377
- > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
378
-
379
- > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
380
-
381
362
  ## dataplex.AspectTypeIamPolicy
382
363
 
383
364
  ```python
@@ -550,25 +531,6 @@ class AspectTypeIamMember(pulumi.CustomResource):
550
531
  member="user:jane@example.com")
551
532
  ```
552
533
 
553
- ## This resource supports User Project Overrides.
554
-
555
- -
556
-
557
- # IAM policy for Dataplex AspectType
558
- Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
559
-
560
- * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
561
- * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
562
- * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
563
-
564
- A data source can be used to retrieve policy data in advent you do not need creation
565
-
566
- * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
567
-
568
- > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
569
-
570
- > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
571
-
572
534
  ## dataplex.AspectTypeIamPolicy
573
535
 
574
536
  ```python
@@ -256,25 +256,6 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
- ## This resource supports User Project Overrides.
260
-
261
- -
262
-
263
- # IAM policy for Dataplex AspectType
264
- Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
265
-
266
- * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
267
- * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
268
- * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
269
-
270
- A data source can be used to retrieve policy data in advent you do not need creation
271
-
272
- * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
273
-
274
- > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
275
-
276
- > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
277
-
278
259
  ## dataplex.AspectTypeIamPolicy
279
260
 
280
261
  ```python
@@ -435,25 +416,6 @@ class AspectTypeIamPolicy(pulumi.CustomResource):
435
416
  member="user:jane@example.com")
436
417
  ```
437
418
 
438
- ## This resource supports User Project Overrides.
439
-
440
- -
441
-
442
- # IAM policy for Dataplex AspectType
443
- Three different resources help you manage your IAM policy for Dataplex AspectType. Each of these resources serves a different use case:
444
-
445
- * `dataplex.AspectTypeIamPolicy`: Authoritative. Sets the IAM policy for the aspecttype and replaces any existing policy already attached.
446
- * `dataplex.AspectTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the aspecttype are preserved.
447
- * `dataplex.AspectTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the aspecttype are preserved.
448
-
449
- A data source can be used to retrieve policy data in advent you do not need creation
450
-
451
- * `dataplex.AspectTypeIamPolicy`: Retrieves the IAM policy for the aspecttype
452
-
453
- > **Note:** `dataplex.AspectTypeIamPolicy` **cannot** be used in conjunction with `dataplex.AspectTypeIamBinding` and `dataplex.AspectTypeIamMember` or they will fight over what your policy should be.
454
-
455
- > **Note:** `dataplex.AspectTypeIamBinding` resources **can be** used in conjunction with `dataplex.AspectTypeIamMember` resources **only if** they do not grant privilege to the same role.
456
-
457
419
  ## dataplex.AspectTypeIamPolicy
458
420
 
459
421
  ```python
@@ -401,25 +401,6 @@ class AssetIamBinding(pulumi.CustomResource):
401
401
  member="user:jane@example.com")
402
402
  ```
403
403
 
404
- ## This resource supports User Project Overrides.
405
-
406
- -
407
-
408
- # IAM policy for Dataplex Asset
409
- Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
410
-
411
- * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
412
- * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
413
- * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
414
-
415
- A data source can be used to retrieve policy data in advent you do not need creation
416
-
417
- * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
418
-
419
- > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
420
-
421
- > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
422
-
423
404
  ## dataplex.AssetIamPolicy
424
405
 
425
406
  ```python
@@ -601,25 +582,6 @@ class AssetIamBinding(pulumi.CustomResource):
601
582
  member="user:jane@example.com")
602
583
  ```
603
584
 
604
- ## This resource supports User Project Overrides.
605
-
606
- -
607
-
608
- # IAM policy for Dataplex Asset
609
- Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
610
-
611
- * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
612
- * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
613
- * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
614
-
615
- A data source can be used to retrieve policy data in advent you do not need creation
616
-
617
- * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
618
-
619
- > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
620
-
621
- > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
622
-
623
585
  ## dataplex.AssetIamPolicy
624
586
 
625
587
  ```python