pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
  264. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -388,6 +388,27 @@ class WebTypeAppEngingIamMember(pulumi.CustomResource):
388
388
  })
389
389
  ```
390
390
 
391
+ ## This resource supports User Project Overrides.
392
+
393
+ -
394
+
395
+ # IAM policy for Identity-Aware Proxy WebTypeAppEngine
396
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
397
+
398
+ * `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
399
+ * `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
400
+ * `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
401
+
402
+ A data source can be used to retrieve policy data in advent you do not need creation
403
+
404
+ * `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
405
+
406
+ > **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
407
+
408
+ > **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
409
+
410
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
411
+
391
412
  ## iap.WebTypeAppEngingIamPolicy
392
413
 
393
414
  ```python
@@ -663,6 +684,27 @@ class WebTypeAppEngingIamMember(pulumi.CustomResource):
663
684
  })
664
685
  ```
665
686
 
687
+ ## This resource supports User Project Overrides.
688
+
689
+ -
690
+
691
+ # IAM policy for Identity-Aware Proxy WebTypeAppEngine
692
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
693
+
694
+ * `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
695
+ * `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
696
+ * `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
697
+
698
+ A data source can be used to retrieve policy data in advent you do not need creation
699
+
700
+ * `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
701
+
702
+ > **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
703
+
704
+ > **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
705
+
706
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
707
+
666
708
  ## iap.WebTypeAppEngingIamPolicy
667
709
 
668
710
  ```python
@@ -273,6 +273,27 @@ class WebTypeAppEngingIamPolicy(pulumi.CustomResource):
273
273
  })
274
274
  ```
275
275
 
276
+ ## This resource supports User Project Overrides.
277
+
278
+ -
279
+
280
+ # IAM policy for Identity-Aware Proxy WebTypeAppEngine
281
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
282
+
283
+ * `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
284
+ * `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
285
+ * `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
286
+
287
+ A data source can be used to retrieve policy data in advent you do not need creation
288
+
289
+ * `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
290
+
291
+ > **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
292
+
293
+ > **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
294
+
295
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
296
+
276
297
  ## iap.WebTypeAppEngingIamPolicy
277
298
 
278
299
  ```python
@@ -534,6 +555,27 @@ class WebTypeAppEngingIamPolicy(pulumi.CustomResource):
534
555
  })
535
556
  ```
536
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for Identity-Aware Proxy WebTypeAppEngine
563
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeAppEngine. Each of these resources serves a different use case:
564
+
565
+ * `iap.WebTypeAppEngingIamPolicy`: Authoritative. Sets the IAM policy for the webtypeappengine and replaces any existing policy already attached.
566
+ * `iap.WebTypeAppEngingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypeappengine are preserved.
567
+ * `iap.WebTypeAppEngingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypeappengine are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `iap.WebTypeAppEngingIamPolicy`: Retrieves the IAM policy for the webtypeappengine
572
+
573
+ > **Note:** `iap.WebTypeAppEngingIamPolicy` **cannot** be used in conjunction with `iap.WebTypeAppEngingIamBinding` and `iap.WebTypeAppEngingIamMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `iap.WebTypeAppEngingIamBinding` resources **can be** used in conjunction with `iap.WebTypeAppEngingIamMember` resources **only if** they do not grant privilege to the same role.
576
+
577
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
578
+
537
579
  ## iap.WebTypeAppEngingIamPolicy
538
580
 
539
581
  ```python
@@ -350,6 +350,27 @@ class WebTypeComputeIamBinding(pulumi.CustomResource):
350
350
  })
351
351
  ```
352
352
 
353
+ ## This resource supports User Project Overrides.
354
+
355
+ -
356
+
357
+ # IAM policy for Identity-Aware Proxy WebTypeCompute
358
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
359
+
360
+ * `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
361
+ * `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
362
+ * `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
363
+
364
+ A data source can be used to retrieve policy data in advent you do not need creation
365
+
366
+ * `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
367
+
368
+ > **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
369
+
370
+ > **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
371
+
372
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
373
+
353
374
  ## iap.WebTypeComputeIamPolicy
354
375
 
355
376
  ```python
@@ -610,6 +631,27 @@ class WebTypeComputeIamBinding(pulumi.CustomResource):
610
631
  })
611
632
  ```
612
633
 
634
+ ## This resource supports User Project Overrides.
635
+
636
+ -
637
+
638
+ # IAM policy for Identity-Aware Proxy WebTypeCompute
639
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
640
+
641
+ * `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
642
+ * `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
643
+ * `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
644
+
645
+ A data source can be used to retrieve policy data in advent you do not need creation
646
+
647
+ * `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
648
+
649
+ > **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
650
+
651
+ > **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
652
+
653
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
654
+
613
655
  ## iap.WebTypeComputeIamPolicy
614
656
 
615
657
  ```python
@@ -350,6 +350,27 @@ class WebTypeComputeIamMember(pulumi.CustomResource):
350
350
  })
351
351
  ```
352
352
 
353
+ ## This resource supports User Project Overrides.
354
+
355
+ -
356
+
357
+ # IAM policy for Identity-Aware Proxy WebTypeCompute
358
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
359
+
360
+ * `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
361
+ * `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
362
+ * `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
363
+
364
+ A data source can be used to retrieve policy data in advent you do not need creation
365
+
366
+ * `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
367
+
368
+ > **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
369
+
370
+ > **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
371
+
372
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
373
+
353
374
  ## iap.WebTypeComputeIamPolicy
354
375
 
355
376
  ```python
@@ -610,6 +631,27 @@ class WebTypeComputeIamMember(pulumi.CustomResource):
610
631
  })
611
632
  ```
612
633
 
634
+ ## This resource supports User Project Overrides.
635
+
636
+ -
637
+
638
+ # IAM policy for Identity-Aware Proxy WebTypeCompute
639
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
640
+
641
+ * `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
642
+ * `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
643
+ * `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
644
+
645
+ A data source can be used to retrieve policy data in advent you do not need creation
646
+
647
+ * `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
648
+
649
+ > **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
650
+
651
+ > **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
652
+
653
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
654
+
613
655
  ## iap.WebTypeComputeIamPolicy
614
656
 
615
657
  ```python
@@ -235,6 +235,27 @@ class WebTypeComputeIamPolicy(pulumi.CustomResource):
235
235
  })
236
236
  ```
237
237
 
238
+ ## This resource supports User Project Overrides.
239
+
240
+ -
241
+
242
+ # IAM policy for Identity-Aware Proxy WebTypeCompute
243
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
244
+
245
+ * `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
246
+ * `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
247
+ * `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
248
+
249
+ A data source can be used to retrieve policy data in advent you do not need creation
250
+
251
+ * `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
252
+
253
+ > **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
254
+
255
+ > **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
256
+
257
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
258
+
238
259
  ## iap.WebTypeComputeIamPolicy
239
260
 
240
261
  ```python
@@ -481,6 +502,27 @@ class WebTypeComputeIamPolicy(pulumi.CustomResource):
481
502
  })
482
503
  ```
483
504
 
505
+ ## This resource supports User Project Overrides.
506
+
507
+ -
508
+
509
+ # IAM policy for Identity-Aware Proxy WebTypeCompute
510
+ Three different resources help you manage your IAM policy for Identity-Aware Proxy WebTypeCompute. Each of these resources serves a different use case:
511
+
512
+ * `iap.WebTypeComputeIamPolicy`: Authoritative. Sets the IAM policy for the webtypecompute and replaces any existing policy already attached.
513
+ * `iap.WebTypeComputeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the webtypecompute are preserved.
514
+ * `iap.WebTypeComputeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the webtypecompute are preserved.
515
+
516
+ A data source can be used to retrieve policy data in advent you do not need creation
517
+
518
+ * `iap.WebTypeComputeIamPolicy`: Retrieves the IAM policy for the webtypecompute
519
+
520
+ > **Note:** `iap.WebTypeComputeIamPolicy` **cannot** be used in conjunction with `iap.WebTypeComputeIamBinding` and `iap.WebTypeComputeIamMember` or they will fight over what your policy should be.
521
+
522
+ > **Note:** `iap.WebTypeComputeIamBinding` resources **can be** used in conjunction with `iap.WebTypeComputeIamMember` resources **only if** they do not grant privilege to the same role.
523
+
524
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
525
+
484
526
  ## iap.WebTypeComputeIamPolicy
485
527
 
486
528
  ```python
@@ -347,47 +347,6 @@ class KeyRingIAMBinding(pulumi.CustomResource):
347
347
  })
348
348
  ```
349
349
 
350
- ## kms.KeyRingIAMPolicy
351
-
352
- ```python
353
- import pulumi
354
- import pulumi_gcp as gcp
355
-
356
- keyring = gcp.kms.KeyRing("keyring",
357
- name="keyring-example",
358
- location="global")
359
- admin = gcp.organizations.get_iam_policy(bindings=[{
360
- "role": "roles/editor",
361
- "members": ["user:jane@example.com"],
362
- }])
363
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
364
- key_ring_id=keyring.id,
365
- policy_data=admin.policy_data)
366
- ```
367
-
368
- With IAM Conditions:
369
-
370
- ```python
371
- import pulumi
372
- import pulumi_gcp as gcp
373
-
374
- keyring = gcp.kms.KeyRing("keyring",
375
- name="keyring-example",
376
- location="global")
377
- admin = gcp.organizations.get_iam_policy(bindings=[{
378
- "role": "roles/editor",
379
- "members": ["user:jane@example.com"],
380
- "condition": {
381
- "title": "expires_after_2019_12_31",
382
- "description": "Expiring at midnight of 2019-12-31",
383
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
384
- },
385
- }])
386
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
387
- key_ring_id=keyring.id,
388
- policy_data=admin.policy_data)
389
- ```
390
-
391
350
  ## kms.KeyRingIAMBinding
392
351
 
393
352
  ```python
@@ -608,47 +567,6 @@ class KeyRingIAMBinding(pulumi.CustomResource):
608
567
  })
609
568
  ```
610
569
 
611
- ## kms.KeyRingIAMPolicy
612
-
613
- ```python
614
- import pulumi
615
- import pulumi_gcp as gcp
616
-
617
- keyring = gcp.kms.KeyRing("keyring",
618
- name="keyring-example",
619
- location="global")
620
- admin = gcp.organizations.get_iam_policy(bindings=[{
621
- "role": "roles/editor",
622
- "members": ["user:jane@example.com"],
623
- }])
624
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
625
- key_ring_id=keyring.id,
626
- policy_data=admin.policy_data)
627
- ```
628
-
629
- With IAM Conditions:
630
-
631
- ```python
632
- import pulumi
633
- import pulumi_gcp as gcp
634
-
635
- keyring = gcp.kms.KeyRing("keyring",
636
- name="keyring-example",
637
- location="global")
638
- admin = gcp.organizations.get_iam_policy(bindings=[{
639
- "role": "roles/editor",
640
- "members": ["user:jane@example.com"],
641
- "condition": {
642
- "title": "expires_after_2019_12_31",
643
- "description": "Expiring at midnight of 2019-12-31",
644
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
645
- },
646
- }])
647
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
648
- key_ring_id=keyring.id,
649
- policy_data=admin.policy_data)
650
- ```
651
-
652
570
  ## kms.KeyRingIAMBinding
653
571
 
654
572
  ```python
@@ -347,47 +347,6 @@ class KeyRingIAMMember(pulumi.CustomResource):
347
347
  })
348
348
  ```
349
349
 
350
- ## kms.KeyRingIAMPolicy
351
-
352
- ```python
353
- import pulumi
354
- import pulumi_gcp as gcp
355
-
356
- keyring = gcp.kms.KeyRing("keyring",
357
- name="keyring-example",
358
- location="global")
359
- admin = gcp.organizations.get_iam_policy(bindings=[{
360
- "role": "roles/editor",
361
- "members": ["user:jane@example.com"],
362
- }])
363
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
364
- key_ring_id=keyring.id,
365
- policy_data=admin.policy_data)
366
- ```
367
-
368
- With IAM Conditions:
369
-
370
- ```python
371
- import pulumi
372
- import pulumi_gcp as gcp
373
-
374
- keyring = gcp.kms.KeyRing("keyring",
375
- name="keyring-example",
376
- location="global")
377
- admin = gcp.organizations.get_iam_policy(bindings=[{
378
- "role": "roles/editor",
379
- "members": ["user:jane@example.com"],
380
- "condition": {
381
- "title": "expires_after_2019_12_31",
382
- "description": "Expiring at midnight of 2019-12-31",
383
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
384
- },
385
- }])
386
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
387
- key_ring_id=keyring.id,
388
- policy_data=admin.policy_data)
389
- ```
390
-
391
350
  ## kms.KeyRingIAMBinding
392
351
 
393
352
  ```python
@@ -608,47 +567,6 @@ class KeyRingIAMMember(pulumi.CustomResource):
608
567
  })
609
568
  ```
610
569
 
611
- ## kms.KeyRingIAMPolicy
612
-
613
- ```python
614
- import pulumi
615
- import pulumi_gcp as gcp
616
-
617
- keyring = gcp.kms.KeyRing("keyring",
618
- name="keyring-example",
619
- location="global")
620
- admin = gcp.organizations.get_iam_policy(bindings=[{
621
- "role": "roles/editor",
622
- "members": ["user:jane@example.com"],
623
- }])
624
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
625
- key_ring_id=keyring.id,
626
- policy_data=admin.policy_data)
627
- ```
628
-
629
- With IAM Conditions:
630
-
631
- ```python
632
- import pulumi
633
- import pulumi_gcp as gcp
634
-
635
- keyring = gcp.kms.KeyRing("keyring",
636
- name="keyring-example",
637
- location="global")
638
- admin = gcp.organizations.get_iam_policy(bindings=[{
639
- "role": "roles/editor",
640
- "members": ["user:jane@example.com"],
641
- "condition": {
642
- "title": "expires_after_2019_12_31",
643
- "description": "Expiring at midnight of 2019-12-31",
644
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
645
- },
646
- }])
647
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
648
- key_ring_id=keyring.id,
649
- policy_data=admin.policy_data)
650
- ```
651
-
652
570
  ## kms.KeyRingIAMBinding
653
571
 
654
572
  ```python
@@ -244,47 +244,6 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
244
244
  })
245
245
  ```
246
246
 
247
- ## kms.KeyRingIAMPolicy
248
-
249
- ```python
250
- import pulumi
251
- import pulumi_gcp as gcp
252
-
253
- keyring = gcp.kms.KeyRing("keyring",
254
- name="keyring-example",
255
- location="global")
256
- admin = gcp.organizations.get_iam_policy(bindings=[{
257
- "role": "roles/editor",
258
- "members": ["user:jane@example.com"],
259
- }])
260
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
261
- key_ring_id=keyring.id,
262
- policy_data=admin.policy_data)
263
- ```
264
-
265
- With IAM Conditions:
266
-
267
- ```python
268
- import pulumi
269
- import pulumi_gcp as gcp
270
-
271
- keyring = gcp.kms.KeyRing("keyring",
272
- name="keyring-example",
273
- location="global")
274
- admin = gcp.organizations.get_iam_policy(bindings=[{
275
- "role": "roles/editor",
276
- "members": ["user:jane@example.com"],
277
- "condition": {
278
- "title": "expires_after_2019_12_31",
279
- "description": "Expiring at midnight of 2019-12-31",
280
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
281
- },
282
- }])
283
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
284
- key_ring_id=keyring.id,
285
- policy_data=admin.policy_data)
286
- ```
287
-
288
247
  ## kms.KeyRingIAMBinding
289
248
 
290
249
  ```python
@@ -494,47 +453,6 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
494
453
  })
495
454
  ```
496
455
 
497
- ## kms.KeyRingIAMPolicy
498
-
499
- ```python
500
- import pulumi
501
- import pulumi_gcp as gcp
502
-
503
- keyring = gcp.kms.KeyRing("keyring",
504
- name="keyring-example",
505
- location="global")
506
- admin = gcp.organizations.get_iam_policy(bindings=[{
507
- "role": "roles/editor",
508
- "members": ["user:jane@example.com"],
509
- }])
510
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
511
- key_ring_id=keyring.id,
512
- policy_data=admin.policy_data)
513
- ```
514
-
515
- With IAM Conditions:
516
-
517
- ```python
518
- import pulumi
519
- import pulumi_gcp as gcp
520
-
521
- keyring = gcp.kms.KeyRing("keyring",
522
- name="keyring-example",
523
- location="global")
524
- admin = gcp.organizations.get_iam_policy(bindings=[{
525
- "role": "roles/editor",
526
- "members": ["user:jane@example.com"],
527
- "condition": {
528
- "title": "expires_after_2019_12_31",
529
- "description": "Expiring at midnight of 2019-12-31",
530
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
531
- },
532
- }])
533
- key_ring = gcp.kms.KeyRingIAMPolicy("key_ring",
534
- key_ring_id=keyring.id,
535
- policy_data=admin.policy_data)
536
- ```
537
-
538
456
  ## kms.KeyRingIAMBinding
539
457
 
540
458
  ```python
@@ -363,6 +363,25 @@ class InstanceIamBinding(pulumi.CustomResource):
363
363
  member="user:jane@example.com")
364
364
  ```
365
365
 
366
+ ## This resource supports User Project Overrides.
367
+
368
+ -
369
+
370
+ # IAM policy for Cloud AI Notebooks Instance
371
+ Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
372
+
373
+ * `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
374
+ * `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
375
+ * `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
376
+
377
+ A data source can be used to retrieve policy data in advent you do not need creation
378
+
379
+ * `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
380
+
381
+ > **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
382
+
383
+ > **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
384
+
366
385
  ## notebooks.InstanceIamPolicy
367
386
 
368
387
  ```python
@@ -535,6 +554,25 @@ class InstanceIamBinding(pulumi.CustomResource):
535
554
  member="user:jane@example.com")
536
555
  ```
537
556
 
557
+ ## This resource supports User Project Overrides.
558
+
559
+ -
560
+
561
+ # IAM policy for Cloud AI Notebooks Instance
562
+ Three different resources help you manage your IAM policy for Cloud AI Notebooks Instance. Each of these resources serves a different use case:
563
+
564
+ * `notebooks.InstanceIamPolicy`: Authoritative. Sets the IAM policy for the instance and replaces any existing policy already attached.
565
+ * `notebooks.InstanceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the instance are preserved.
566
+ * `notebooks.InstanceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the instance are preserved.
567
+
568
+ A data source can be used to retrieve policy data in advent you do not need creation
569
+
570
+ * `notebooks.InstanceIamPolicy`: Retrieves the IAM policy for the instance
571
+
572
+ > **Note:** `notebooks.InstanceIamPolicy` **cannot** be used in conjunction with `notebooks.InstanceIamBinding` and `notebooks.InstanceIamMember` or they will fight over what your policy should be.
573
+
574
+ > **Note:** `notebooks.InstanceIamBinding` resources **can be** used in conjunction with `notebooks.InstanceIamMember` resources **only if** they do not grant privilege to the same role.
575
+
538
576
  ## notebooks.InstanceIamPolicy
539
577
 
540
578
  ```python