pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
  264. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -359,6 +359,25 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataproc metastore Federation
367
+ Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
368
+
369
+ * `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
370
+ * `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
371
+ * `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
376
+
377
+ > **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataproc.MetastoreFederationIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class MetastoreFederationIamMember(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataproc metastore Federation
558
+ Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
559
+
560
+ * `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
561
+ * `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
562
+ * `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
567
+
568
+ > **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataproc.MetastoreFederationIamPolicy
535
573
 
536
574
  ```python
@@ -256,6 +256,25 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
+ ## This resource supports User Project Overrides.
260
+
261
+ -
262
+
263
+ # IAM policy for Dataproc metastore Federation
264
+ Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
265
+
266
+ * `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
267
+ * `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
268
+ * `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
269
+
270
+ A data source can be used to retrieve policy data in advent you do not need creation
271
+
272
+ * `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
273
+
274
+ > **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
275
+
276
+ > **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
277
+
259
278
  ## dataproc.MetastoreFederationIamPolicy
260
279
 
261
280
  ```python
@@ -416,6 +435,25 @@ class MetastoreFederationIamPolicy(pulumi.CustomResource):
416
435
  member="user:jane@example.com")
417
436
  ```
418
437
 
438
+ ## This resource supports User Project Overrides.
439
+
440
+ -
441
+
442
+ # IAM policy for Dataproc metastore Federation
443
+ Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
444
+
445
+ * `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
446
+ * `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
447
+ * `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
448
+
449
+ A data source can be used to retrieve policy data in advent you do not need creation
450
+
451
+ * `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
452
+
453
+ > **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
454
+
455
+ > **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
456
+
419
457
  ## dataproc.MetastoreFederationIamPolicy
420
458
 
421
459
  ```python
@@ -363,6 +363,25 @@ class MetastoreServiceIamBinding(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
+ ## This resource supports User Project Overrides.
367
+
368
+ -
369
+
370
+ # IAM policy for Dataproc metastore Service
371
+ Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
372
+
373
+ * `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
374
+ * `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
375
+ * `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
376
+
377
+ A data source can be used to retrieve policy data in advent you do not need creation
378
+
379
+ * `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
380
+
381
+ > **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
382
+
383
+ > **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
384
+
366
385
  ## dataproc.MetastoreServiceIamPolicy
367
386
 
368
387
  ```python
@@ -536,6 +555,25 @@ class MetastoreServiceIamBinding(pulumi.CustomResource):
536
555
  member="user:jane@example.com")
537
556
  ```
538
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for Dataproc metastore Service
563
+ Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
564
+
565
+ * `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
566
+ * `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
567
+ * `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
572
+
573
+ > **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
576
+
539
577
  ## dataproc.MetastoreServiceIamPolicy
540
578
 
541
579
  ```python
@@ -363,6 +363,25 @@ class MetastoreServiceIamMember(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
+ ## This resource supports User Project Overrides.
367
+
368
+ -
369
+
370
+ # IAM policy for Dataproc metastore Service
371
+ Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
372
+
373
+ * `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
374
+ * `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
375
+ * `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
376
+
377
+ A data source can be used to retrieve policy data in advent you do not need creation
378
+
379
+ * `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
380
+
381
+ > **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
382
+
383
+ > **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
384
+
366
385
  ## dataproc.MetastoreServiceIamPolicy
367
386
 
368
387
  ```python
@@ -536,6 +555,25 @@ class MetastoreServiceIamMember(pulumi.CustomResource):
536
555
  member="user:jane@example.com")
537
556
  ```
538
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for Dataproc metastore Service
563
+ Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
564
+
565
+ * `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
566
+ * `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
567
+ * `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
572
+
573
+ > **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
576
+
539
577
  ## dataproc.MetastoreServiceIamPolicy
540
578
 
541
579
  ```python
@@ -260,6 +260,25 @@ class MetastoreServiceIamPolicy(pulumi.CustomResource):
260
260
  member="user:jane@example.com")
261
261
  ```
262
262
 
263
+ ## This resource supports User Project Overrides.
264
+
265
+ -
266
+
267
+ # IAM policy for Dataproc metastore Service
268
+ Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
269
+
270
+ * `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
271
+ * `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
272
+ * `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
273
+
274
+ A data source can be used to retrieve policy data in advent you do not need creation
275
+
276
+ * `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
277
+
278
+ > **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
279
+
280
+ > **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
281
+
263
282
  ## dataproc.MetastoreServiceIamPolicy
264
283
 
265
284
  ```python
@@ -421,6 +440,25 @@ class MetastoreServiceIamPolicy(pulumi.CustomResource):
421
440
  member="user:jane@example.com")
422
441
  ```
423
442
 
443
+ ## This resource supports User Project Overrides.
444
+
445
+ -
446
+
447
+ # IAM policy for Dataproc metastore Service
448
+ Three different resources help you manage your IAM policy for Dataproc metastore Service. Each of these resources serves a different use case:
449
+
450
+ * `dataproc.MetastoreServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
451
+ * `dataproc.MetastoreServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
452
+ * `dataproc.MetastoreServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
453
+
454
+ A data source can be used to retrieve policy data in advent you do not need creation
455
+
456
+ * `dataproc.MetastoreServiceIamPolicy`: Retrieves the IAM policy for the service
457
+
458
+ > **Note:** `dataproc.MetastoreServiceIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreServiceIamBinding` and `dataproc.MetastoreServiceIamMember` or they will fight over what your policy should be.
459
+
460
+ > **Note:** `dataproc.MetastoreServiceIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreServiceIamMember` resources **only if** they do not grant privilege to the same role.
461
+
424
462
  ## dataproc.MetastoreServiceIamPolicy
425
463
 
426
464
  ```python
@@ -319,6 +319,25 @@ class DnsManagedZoneIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud DNS ManagedZone
327
+ Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
328
+
329
+ * `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
330
+ * `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
331
+ * `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
336
+
337
+ > **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## dns.DnsManagedZoneIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class DnsManagedZoneIamBinding(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Cloud DNS ManagedZone
507
+ Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
508
+
509
+ * `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
510
+ * `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
511
+ * `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
516
+
517
+ > **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## dns.DnsManagedZoneIamPolicy
484
522
 
485
523
  ```python
@@ -319,6 +319,25 @@ class DnsManagedZoneIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Cloud DNS ManagedZone
327
+ Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
328
+
329
+ * `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
330
+ * `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
331
+ * `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
336
+
337
+ > **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## dns.DnsManagedZoneIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class DnsManagedZoneIamMember(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Cloud DNS ManagedZone
507
+ Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
508
+
509
+ * `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
510
+ * `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
511
+ * `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
516
+
517
+ > **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## dns.DnsManagedZoneIamPolicy
484
522
 
485
523
  ```python
@@ -216,6 +216,25 @@ class DnsManagedZoneIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
+ ## This resource supports User Project Overrides.
220
+
221
+ -
222
+
223
+ # IAM policy for Cloud DNS ManagedZone
224
+ Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
225
+
226
+ * `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
227
+ * `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
228
+ * `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
229
+
230
+ A data source can be used to retrieve policy data in advent you do not need creation
231
+
232
+ * `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
233
+
234
+ > **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
235
+
236
+ > **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
237
+
219
238
  ## dns.DnsManagedZoneIamPolicy
220
239
 
221
240
  ```python
@@ -365,6 +384,25 @@ class DnsManagedZoneIamPolicy(pulumi.CustomResource):
365
384
  member="user:jane@example.com")
366
385
  ```
367
386
 
387
+ ## This resource supports User Project Overrides.
388
+
389
+ -
390
+
391
+ # IAM policy for Cloud DNS ManagedZone
392
+ Three different resources help you manage your IAM policy for Cloud DNS ManagedZone. Each of these resources serves a different use case:
393
+
394
+ * `dns.DnsManagedZoneIamPolicy`: Authoritative. Sets the IAM policy for the managedzone and replaces any existing policy already attached.
395
+ * `dns.DnsManagedZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedzone are preserved.
396
+ * `dns.DnsManagedZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedzone are preserved.
397
+
398
+ A data source can be used to retrieve policy data in advent you do not need creation
399
+
400
+ * `dns.DnsManagedZoneIamPolicy`: Retrieves the IAM policy for the managedzone
401
+
402
+ > **Note:** `dns.DnsManagedZoneIamPolicy` **cannot** be used in conjunction with `dns.DnsManagedZoneIamBinding` and `dns.DnsManagedZoneIamMember` or they will fight over what your policy should be.
403
+
404
+ > **Note:** `dns.DnsManagedZoneIamBinding` resources **can be** used in conjunction with `dns.DnsManagedZoneIamMember` resources **only if** they do not grant privilege to the same role.
405
+
368
406
  ## dns.DnsManagedZoneIamPolicy
369
407
 
370
408
  ```python
@@ -271,6 +271,26 @@ class ServiceIamBinding(pulumi.CustomResource):
271
271
  member="user:jane@example.com")
272
272
  ```
273
273
 
274
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
275
+
276
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
277
+ ---
278
+
279
+ # IAM policy for Cloud Endpoints Service
280
+ Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
281
+
282
+ * `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
283
+ * `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
284
+ * `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
285
+
286
+ A data source can be used to retrieve policy data in advent you do not need creation
287
+
288
+ * `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
289
+
290
+ > **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
291
+
292
+ > **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
293
+
274
294
  ## endpoints.ServiceIamPolicy
275
295
 
276
296
  ```python
@@ -421,6 +441,26 @@ class ServiceIamBinding(pulumi.CustomResource):
421
441
  member="user:jane@example.com")
422
442
  ```
423
443
 
444
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
445
+
446
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
447
+ ---
448
+
449
+ # IAM policy for Cloud Endpoints Service
450
+ Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
451
+
452
+ * `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
453
+ * `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
454
+ * `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
455
+
456
+ A data source can be used to retrieve policy data in advent you do not need creation
457
+
458
+ * `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
459
+
460
+ > **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
461
+
462
+ > **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
463
+
424
464
  ## endpoints.ServiceIamPolicy
425
465
 
426
466
  ```python
@@ -271,6 +271,26 @@ class ServiceIamMember(pulumi.CustomResource):
271
271
  member="user:jane@example.com")
272
272
  ```
273
273
 
274
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
275
+
276
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
277
+ ---
278
+
279
+ # IAM policy for Cloud Endpoints Service
280
+ Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
281
+
282
+ * `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
283
+ * `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
284
+ * `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
285
+
286
+ A data source can be used to retrieve policy data in advent you do not need creation
287
+
288
+ * `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
289
+
290
+ > **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
291
+
292
+ > **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
293
+
274
294
  ## endpoints.ServiceIamPolicy
275
295
 
276
296
  ```python
@@ -421,6 +441,26 @@ class ServiceIamMember(pulumi.CustomResource):
421
441
  member="user:jane@example.com")
422
442
  ```
423
443
 
444
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
445
+
446
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
447
+ ---
448
+
449
+ # IAM policy for Cloud Endpoints Service
450
+ Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
451
+
452
+ * `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
453
+ * `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
454
+ * `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
455
+
456
+ A data source can be used to retrieve policy data in advent you do not need creation
457
+
458
+ * `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
459
+
460
+ > **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
461
+
462
+ > **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
463
+
424
464
  ## endpoints.ServiceIamPolicy
425
465
 
426
466
  ```python
@@ -168,6 +168,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
168
168
  member="user:jane@example.com")
169
169
  ```
170
170
 
171
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
172
+
173
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
174
+ ---
175
+
176
+ # IAM policy for Cloud Endpoints Service
177
+ Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
178
+
179
+ * `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
180
+ * `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
181
+ * `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
182
+
183
+ A data source can be used to retrieve policy data in advent you do not need creation
184
+
185
+ * `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
186
+
187
+ > **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
188
+
189
+ > **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
190
+
171
191
  ## endpoints.ServiceIamPolicy
172
192
 
173
193
  ```python
@@ -306,6 +326,26 @@ class ServiceIamPolicy(pulumi.CustomResource):
306
326
  member="user:jane@example.com")
307
327
  ```
308
328
 
329
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
330
+
331
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
332
+ ---
333
+
334
+ # IAM policy for Cloud Endpoints Service
335
+ Three different resources help you manage your IAM policy for Cloud Endpoints Service. Each of these resources serves a different use case:
336
+
337
+ * `endpoints.ServiceIamPolicy`: Authoritative. Sets the IAM policy for the service and replaces any existing policy already attached.
338
+ * `endpoints.ServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the service are preserved.
339
+ * `endpoints.ServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the service are preserved.
340
+
341
+ A data source can be used to retrieve policy data in advent you do not need creation
342
+
343
+ * `endpoints.ServiceIamPolicy`: Retrieves the IAM policy for the service
344
+
345
+ > **Note:** `endpoints.ServiceIamPolicy` **cannot** be used in conjunction with `endpoints.ServiceIamBinding` and `endpoints.ServiceIamMember` or they will fight over what your policy should be.
346
+
347
+ > **Note:** `endpoints.ServiceIamBinding` resources **can be** used in conjunction with `endpoints.ServiceIamMember` resources **only if** they do not grant privilege to the same role.
348
+
309
349
  ## endpoints.ServiceIamPolicy
310
350
 
311
351
  ```python