pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
  264. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -401,6 +401,25 @@ class AssetIamMember(pulumi.CustomResource):
401
401
  member="user:jane@example.com")
402
402
  ```
403
403
 
404
+ ## This resource supports User Project Overrides.
405
+
406
+ -
407
+
408
+ # IAM policy for Dataplex Asset
409
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
410
+
411
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
412
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
413
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
414
+
415
+ A data source can be used to retrieve policy data in advent you do not need creation
416
+
417
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
418
+
419
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
420
+
421
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
422
+
404
423
  ## dataplex.AssetIamPolicy
405
424
 
406
425
  ```python
@@ -582,6 +601,25 @@ class AssetIamMember(pulumi.CustomResource):
582
601
  member="user:jane@example.com")
583
602
  ```
584
603
 
604
+ ## This resource supports User Project Overrides.
605
+
606
+ -
607
+
608
+ # IAM policy for Dataplex Asset
609
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
610
+
611
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
612
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
613
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
614
+
615
+ A data source can be used to retrieve policy data in advent you do not need creation
616
+
617
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
618
+
619
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
620
+
621
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
622
+
585
623
  ## dataplex.AssetIamPolicy
586
624
 
587
625
  ```python
@@ -298,6 +298,25 @@ class AssetIamPolicy(pulumi.CustomResource):
298
298
  member="user:jane@example.com")
299
299
  ```
300
300
 
301
+ ## This resource supports User Project Overrides.
302
+
303
+ -
304
+
305
+ # IAM policy for Dataplex Asset
306
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
307
+
308
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
309
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
310
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
311
+
312
+ A data source can be used to retrieve policy data in advent you do not need creation
313
+
314
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
315
+
316
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
317
+
318
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
319
+
301
320
  ## dataplex.AssetIamPolicy
302
321
 
303
322
  ```python
@@ -467,6 +486,25 @@ class AssetIamPolicy(pulumi.CustomResource):
467
486
  member="user:jane@example.com")
468
487
  ```
469
488
 
489
+ ## This resource supports User Project Overrides.
490
+
491
+ -
492
+
493
+ # IAM policy for Dataplex Asset
494
+ Three different resources help you manage your IAM policy for Dataplex Asset. Each of these resources serves a different use case:
495
+
496
+ * `dataplex.AssetIamPolicy`: Authoritative. Sets the IAM policy for the asset and replaces any existing policy already attached.
497
+ * `dataplex.AssetIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the asset are preserved.
498
+ * `dataplex.AssetIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the asset are preserved.
499
+
500
+ A data source can be used to retrieve policy data in advent you do not need creation
501
+
502
+ * `dataplex.AssetIamPolicy`: Retrieves the IAM policy for the asset
503
+
504
+ > **Note:** `dataplex.AssetIamPolicy` **cannot** be used in conjunction with `dataplex.AssetIamBinding` and `dataplex.AssetIamMember` or they will fight over what your policy should be.
505
+
506
+ > **Note:** `dataplex.AssetIamBinding` resources **can be** used in conjunction with `dataplex.AssetIamMember` resources **only if** they do not grant privilege to the same role.
507
+
470
508
  ## dataplex.AssetIamPolicy
471
509
 
472
510
  ```python
@@ -359,6 +359,25 @@ class DatascanIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex Datascan
367
+ Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
370
+ * `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
371
+ * `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
376
+
377
+ > **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.DatascanIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class DatascanIamBinding(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex Datascan
558
+ Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
561
+ * `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
562
+ * `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
567
+
568
+ > **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.DatascanIamPolicy
535
573
 
536
574
  ```python
@@ -359,6 +359,25 @@ class DatascanIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex Datascan
367
+ Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
370
+ * `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
371
+ * `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
376
+
377
+ > **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.DatascanIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class DatascanIamMember(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex Datascan
558
+ Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
561
+ * `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
562
+ * `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
567
+
568
+ > **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.DatascanIamPolicy
535
573
 
536
574
  ```python
@@ -256,6 +256,25 @@ class DatascanIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
+ ## This resource supports User Project Overrides.
260
+
261
+ -
262
+
263
+ # IAM policy for Dataplex Datascan
264
+ Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
265
+
266
+ * `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
267
+ * `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
268
+ * `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
269
+
270
+ A data source can be used to retrieve policy data in advent you do not need creation
271
+
272
+ * `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
273
+
274
+ > **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
275
+
276
+ > **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
277
+
259
278
  ## dataplex.DatascanIamPolicy
260
279
 
261
280
  ```python
@@ -416,6 +435,25 @@ class DatascanIamPolicy(pulumi.CustomResource):
416
435
  member="user:jane@example.com")
417
436
  ```
418
437
 
438
+ ## This resource supports User Project Overrides.
439
+
440
+ -
441
+
442
+ # IAM policy for Dataplex Datascan
443
+ Three different resources help you manage your IAM policy for Dataplex Datascan. Each of these resources serves a different use case:
444
+
445
+ * `dataplex.DatascanIamPolicy`: Authoritative. Sets the IAM policy for the datascan and replaces any existing policy already attached.
446
+ * `dataplex.DatascanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datascan are preserved.
447
+ * `dataplex.DatascanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datascan are preserved.
448
+
449
+ A data source can be used to retrieve policy data in advent you do not need creation
450
+
451
+ * `dataplex.DatascanIamPolicy`: Retrieves the IAM policy for the datascan
452
+
453
+ > **Note:** `dataplex.DatascanIamPolicy` **cannot** be used in conjunction with `dataplex.DatascanIamBinding` and `dataplex.DatascanIamMember` or they will fight over what your policy should be.
454
+
455
+ > **Note:** `dataplex.DatascanIamBinding` resources **can be** used in conjunction with `dataplex.DatascanIamMember` resources **only if** they do not grant privilege to the same role.
456
+
419
457
  ## dataplex.DatascanIamPolicy
420
458
 
421
459
  ```python
@@ -359,6 +359,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex EntryGroup
367
+ Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
370
+ * `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
371
+ * `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
376
+
377
+ > **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.EntryGroupIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class EntryGroupIamBinding(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex EntryGroup
558
+ Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
561
+ * `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
562
+ * `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
567
+
568
+ > **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.EntryGroupIamPolicy
535
573
 
536
574
  ```python
@@ -359,6 +359,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex EntryGroup
367
+ Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
370
+ * `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
371
+ * `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
376
+
377
+ > **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.EntryGroupIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class EntryGroupIamMember(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex EntryGroup
558
+ Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
561
+ * `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
562
+ * `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
567
+
568
+ > **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.EntryGroupIamPolicy
535
573
 
536
574
  ```python
@@ -256,6 +256,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
+ ## This resource supports User Project Overrides.
260
+
261
+ -
262
+
263
+ # IAM policy for Dataplex EntryGroup
264
+ Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
265
+
266
+ * `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
267
+ * `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
268
+ * `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
269
+
270
+ A data source can be used to retrieve policy data in advent you do not need creation
271
+
272
+ * `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
273
+
274
+ > **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
275
+
276
+ > **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
277
+
259
278
  ## dataplex.EntryGroupIamPolicy
260
279
 
261
280
  ```python
@@ -416,6 +435,25 @@ class EntryGroupIamPolicy(pulumi.CustomResource):
416
435
  member="user:jane@example.com")
417
436
  ```
418
437
 
438
+ ## This resource supports User Project Overrides.
439
+
440
+ -
441
+
442
+ # IAM policy for Dataplex EntryGroup
443
+ Three different resources help you manage your IAM policy for Dataplex EntryGroup. Each of these resources serves a different use case:
444
+
445
+ * `dataplex.EntryGroupIamPolicy`: Authoritative. Sets the IAM policy for the entrygroup and replaces any existing policy already attached.
446
+ * `dataplex.EntryGroupIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrygroup are preserved.
447
+ * `dataplex.EntryGroupIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrygroup are preserved.
448
+
449
+ A data source can be used to retrieve policy data in advent you do not need creation
450
+
451
+ * `dataplex.EntryGroupIamPolicy`: Retrieves the IAM policy for the entrygroup
452
+
453
+ > **Note:** `dataplex.EntryGroupIamPolicy` **cannot** be used in conjunction with `dataplex.EntryGroupIamBinding` and `dataplex.EntryGroupIamMember` or they will fight over what your policy should be.
454
+
455
+ > **Note:** `dataplex.EntryGroupIamBinding` resources **can be** used in conjunction with `dataplex.EntryGroupIamMember` resources **only if** they do not grant privilege to the same role.
456
+
419
457
  ## dataplex.EntryGroupIamPolicy
420
458
 
421
459
  ```python
@@ -359,6 +359,25 @@ class EntryTypeIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex EntryType
367
+ Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
370
+ * `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
371
+ * `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
376
+
377
+ > **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.EntryTypeIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class EntryTypeIamBinding(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex EntryType
558
+ Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
561
+ * `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
562
+ * `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
567
+
568
+ > **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.EntryTypeIamPolicy
535
573
 
536
574
  ```python
@@ -359,6 +359,25 @@ class EntryTypeIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataplex EntryType
367
+ Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
368
+
369
+ * `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
370
+ * `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
371
+ * `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
376
+
377
+ > **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataplex.EntryTypeIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class EntryTypeIamMember(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataplex EntryType
558
+ Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
559
+
560
+ * `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
561
+ * `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
562
+ * `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
567
+
568
+ > **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataplex.EntryTypeIamPolicy
535
573
 
536
574
  ```python
@@ -256,6 +256,25 @@ class EntryTypeIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
+ ## This resource supports User Project Overrides.
260
+
261
+ -
262
+
263
+ # IAM policy for Dataplex EntryType
264
+ Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
265
+
266
+ * `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
267
+ * `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
268
+ * `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
269
+
270
+ A data source can be used to retrieve policy data in advent you do not need creation
271
+
272
+ * `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
273
+
274
+ > **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
275
+
276
+ > **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
277
+
259
278
  ## dataplex.EntryTypeIamPolicy
260
279
 
261
280
  ```python
@@ -416,6 +435,25 @@ class EntryTypeIamPolicy(pulumi.CustomResource):
416
435
  member="user:jane@example.com")
417
436
  ```
418
437
 
438
+ ## This resource supports User Project Overrides.
439
+
440
+ -
441
+
442
+ # IAM policy for Dataplex EntryType
443
+ Three different resources help you manage your IAM policy for Dataplex EntryType. Each of these resources serves a different use case:
444
+
445
+ * `dataplex.EntryTypeIamPolicy`: Authoritative. Sets the IAM policy for the entrytype and replaces any existing policy already attached.
446
+ * `dataplex.EntryTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the entrytype are preserved.
447
+ * `dataplex.EntryTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the entrytype are preserved.
448
+
449
+ A data source can be used to retrieve policy data in advent you do not need creation
450
+
451
+ * `dataplex.EntryTypeIamPolicy`: Retrieves the IAM policy for the entrytype
452
+
453
+ > **Note:** `dataplex.EntryTypeIamPolicy` **cannot** be used in conjunction with `dataplex.EntryTypeIamBinding` and `dataplex.EntryTypeIamMember` or they will fight over what your policy should be.
454
+
455
+ > **Note:** `dataplex.EntryTypeIamBinding` resources **can be** used in conjunction with `dataplex.EntryTypeIamMember` resources **only if** they do not grant privilege to the same role.
456
+
419
457
  ## dataplex.EntryTypeIamPolicy
420
458
 
421
459
  ```python
@@ -347,6 +347,25 @@ class LakeIamBinding(pulumi.CustomResource):
347
347
  member="user:jane@example.com")
348
348
  ```
349
349
 
350
+ ## This resource supports User Project Overrides.
351
+
352
+ -
353
+
354
+ # IAM policy for Dataplex Lake
355
+ Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
356
+
357
+ * `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
358
+ * `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
359
+ * `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
360
+
361
+ A data source can be used to retrieve policy data in advent you do not need creation
362
+
363
+ * `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
364
+
365
+ > **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
366
+
367
+ > **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
368
+
350
369
  ## dataplex.LakeIamPolicy
351
370
 
352
371
  ```python
@@ -516,6 +535,25 @@ class LakeIamBinding(pulumi.CustomResource):
516
535
  member="user:jane@example.com")
517
536
  ```
518
537
 
538
+ ## This resource supports User Project Overrides.
539
+
540
+ -
541
+
542
+ # IAM policy for Dataplex Lake
543
+ Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
544
+
545
+ * `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
546
+ * `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
547
+ * `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
548
+
549
+ A data source can be used to retrieve policy data in advent you do not need creation
550
+
551
+ * `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
552
+
553
+ > **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
554
+
555
+ > **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
556
+
519
557
  ## dataplex.LakeIamPolicy
520
558
 
521
559
  ```python