pulumi-gcp 7.36.0a1723010828__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
  264. {pulumi_gcp-7.36.0a1723010828.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -407,43 +407,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
407
407
  })
408
408
  ```
409
409
 
410
- ## spanner.DatabaseIAMPolicy
411
-
412
- ```python
413
- import pulumi
414
- import pulumi_gcp as gcp
415
-
416
- admin = gcp.organizations.get_iam_policy(bindings=[{
417
- "role": "roles/editor",
418
- "members": ["user:jane@example.com"],
419
- }])
420
- database = gcp.spanner.DatabaseIAMPolicy("database",
421
- instance="your-instance-name",
422
- database="your-database-name",
423
- policy_data=admin.policy_data)
424
- ```
425
-
426
- With IAM Conditions:
427
-
428
- ```python
429
- import pulumi
430
- import pulumi_gcp as gcp
431
-
432
- admin = gcp.organizations.get_iam_policy(bindings=[{
433
- "role": "roles/editor",
434
- "members": ["user:jane@example.com"],
435
- "condition": {
436
- "title": "My Role",
437
- "description": "Grant permissions on my_role",
438
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
439
- },
440
- }])
441
- database = gcp.spanner.DatabaseIAMPolicy("database",
442
- instance="your-instance-name",
443
- database="your-database-name",
444
- policy_data=admin.policy_data)
445
- ```
446
-
447
410
  ## spanner.DatabaseIAMBinding
448
411
 
449
412
  ```python
@@ -671,43 +634,6 @@ class DatabaseIAMMember(pulumi.CustomResource):
671
634
  })
672
635
  ```
673
636
 
674
- ## spanner.DatabaseIAMPolicy
675
-
676
- ```python
677
- import pulumi
678
- import pulumi_gcp as gcp
679
-
680
- admin = gcp.organizations.get_iam_policy(bindings=[{
681
- "role": "roles/editor",
682
- "members": ["user:jane@example.com"],
683
- }])
684
- database = gcp.spanner.DatabaseIAMPolicy("database",
685
- instance="your-instance-name",
686
- database="your-database-name",
687
- policy_data=admin.policy_data)
688
- ```
689
-
690
- With IAM Conditions:
691
-
692
- ```python
693
- import pulumi
694
- import pulumi_gcp as gcp
695
-
696
- admin = gcp.organizations.get_iam_policy(bindings=[{
697
- "role": "roles/editor",
698
- "members": ["user:jane@example.com"],
699
- "condition": {
700
- "title": "My Role",
701
- "description": "Grant permissions on my_role",
702
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
703
- },
704
- }])
705
- database = gcp.spanner.DatabaseIAMPolicy("database",
706
- instance="your-instance-name",
707
- database="your-database-name",
708
- policy_data=admin.policy_data)
709
- ```
710
-
711
637
  ## spanner.DatabaseIAMBinding
712
638
 
713
639
  ```python
@@ -304,43 +304,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
304
304
  })
305
305
  ```
306
306
 
307
- ## spanner.DatabaseIAMPolicy
308
-
309
- ```python
310
- import pulumi
311
- import pulumi_gcp as gcp
312
-
313
- admin = gcp.organizations.get_iam_policy(bindings=[{
314
- "role": "roles/editor",
315
- "members": ["user:jane@example.com"],
316
- }])
317
- database = gcp.spanner.DatabaseIAMPolicy("database",
318
- instance="your-instance-name",
319
- database="your-database-name",
320
- policy_data=admin.policy_data)
321
- ```
322
-
323
- With IAM Conditions:
324
-
325
- ```python
326
- import pulumi
327
- import pulumi_gcp as gcp
328
-
329
- admin = gcp.organizations.get_iam_policy(bindings=[{
330
- "role": "roles/editor",
331
- "members": ["user:jane@example.com"],
332
- "condition": {
333
- "title": "My Role",
334
- "description": "Grant permissions on my_role",
335
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
336
- },
337
- }])
338
- database = gcp.spanner.DatabaseIAMPolicy("database",
339
- instance="your-instance-name",
340
- database="your-database-name",
341
- policy_data=admin.policy_data)
342
- ```
343
-
344
307
  ## spanner.DatabaseIAMBinding
345
308
 
346
309
  ```python
@@ -557,43 +520,6 @@ class DatabaseIAMPolicy(pulumi.CustomResource):
557
520
  })
558
521
  ```
559
522
 
560
- ## spanner.DatabaseIAMPolicy
561
-
562
- ```python
563
- import pulumi
564
- import pulumi_gcp as gcp
565
-
566
- admin = gcp.organizations.get_iam_policy(bindings=[{
567
- "role": "roles/editor",
568
- "members": ["user:jane@example.com"],
569
- }])
570
- database = gcp.spanner.DatabaseIAMPolicy("database",
571
- instance="your-instance-name",
572
- database="your-database-name",
573
- policy_data=admin.policy_data)
574
- ```
575
-
576
- With IAM Conditions:
577
-
578
- ```python
579
- import pulumi
580
- import pulumi_gcp as gcp
581
-
582
- admin = gcp.organizations.get_iam_policy(bindings=[{
583
- "role": "roles/editor",
584
- "members": ["user:jane@example.com"],
585
- "condition": {
586
- "title": "My Role",
587
- "description": "Grant permissions on my_role",
588
- "expression": "(resource.type == \\"spanner.googleapis.com/DatabaseRole\\" && (resource.name.endsWith(\\"/myrole\\")))",
589
- },
590
- }])
591
- database = gcp.spanner.DatabaseIAMPolicy("database",
592
- instance="your-instance-name",
593
- database="your-database-name",
594
- policy_data=admin.policy_data)
595
- ```
596
-
597
523
  ## spanner.DatabaseIAMBinding
598
524
 
599
525
  ```python
@@ -303,21 +303,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
303
303
  member="user:jane@example.com")
304
304
  ```
305
305
 
306
- ## spanner.InstanceIAMPolicy
307
-
308
- ```python
309
- import pulumi
310
- import pulumi_gcp as gcp
311
-
312
- admin = gcp.organizations.get_iam_policy(bindings=[{
313
- "role": "roles/editor",
314
- "members": ["user:jane@example.com"],
315
- }])
316
- instance = gcp.spanner.InstanceIAMPolicy("instance",
317
- instance="your-instance-name",
318
- policy_data=admin.policy_data)
319
- ```
320
-
321
306
  ## spanner.InstanceIAMBinding
322
307
 
323
308
  ```python
@@ -444,21 +429,6 @@ class InstanceIAMBinding(pulumi.CustomResource):
444
429
  member="user:jane@example.com")
445
430
  ```
446
431
 
447
- ## spanner.InstanceIAMPolicy
448
-
449
- ```python
450
- import pulumi
451
- import pulumi_gcp as gcp
452
-
453
- admin = gcp.organizations.get_iam_policy(bindings=[{
454
- "role": "roles/editor",
455
- "members": ["user:jane@example.com"],
456
- }])
457
- instance = gcp.spanner.InstanceIAMPolicy("instance",
458
- instance="your-instance-name",
459
- policy_data=admin.policy_data)
460
- ```
461
-
462
432
  ## spanner.InstanceIAMBinding
463
433
 
464
434
  ```python
@@ -303,21 +303,6 @@ class InstanceIAMMember(pulumi.CustomResource):
303
303
  member="user:jane@example.com")
304
304
  ```
305
305
 
306
- ## spanner.InstanceIAMPolicy
307
-
308
- ```python
309
- import pulumi
310
- import pulumi_gcp as gcp
311
-
312
- admin = gcp.organizations.get_iam_policy(bindings=[{
313
- "role": "roles/editor",
314
- "members": ["user:jane@example.com"],
315
- }])
316
- instance = gcp.spanner.InstanceIAMPolicy("instance",
317
- instance="your-instance-name",
318
- policy_data=admin.policy_data)
319
- ```
320
-
321
306
  ## spanner.InstanceIAMBinding
322
307
 
323
308
  ```python
@@ -444,21 +429,6 @@ class InstanceIAMMember(pulumi.CustomResource):
444
429
  member="user:jane@example.com")
445
430
  ```
446
431
 
447
- ## spanner.InstanceIAMPolicy
448
-
449
- ```python
450
- import pulumi
451
- import pulumi_gcp as gcp
452
-
453
- admin = gcp.organizations.get_iam_policy(bindings=[{
454
- "role": "roles/editor",
455
- "members": ["user:jane@example.com"],
456
- }])
457
- instance = gcp.spanner.InstanceIAMPolicy("instance",
458
- instance="your-instance-name",
459
- policy_data=admin.policy_data)
460
- ```
461
-
462
432
  ## spanner.InstanceIAMBinding
463
433
 
464
434
  ```python
@@ -212,21 +212,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
212
212
  member="user:jane@example.com")
213
213
  ```
214
214
 
215
- ## spanner.InstanceIAMPolicy
216
-
217
- ```python
218
- import pulumi
219
- import pulumi_gcp as gcp
220
-
221
- admin = gcp.organizations.get_iam_policy(bindings=[{
222
- "role": "roles/editor",
223
- "members": ["user:jane@example.com"],
224
- }])
225
- instance = gcp.spanner.InstanceIAMPolicy("instance",
226
- instance="your-instance-name",
227
- policy_data=admin.policy_data)
228
- ```
229
-
230
215
  ## spanner.InstanceIAMBinding
231
216
 
232
217
  ```python
@@ -344,21 +329,6 @@ class InstanceIAMPolicy(pulumi.CustomResource):
344
329
  member="user:jane@example.com")
345
330
  ```
346
331
 
347
- ## spanner.InstanceIAMPolicy
348
-
349
- ```python
350
- import pulumi
351
- import pulumi_gcp as gcp
352
-
353
- admin = gcp.organizations.get_iam_policy(bindings=[{
354
- "role": "roles/editor",
355
- "members": ["user:jane@example.com"],
356
- }])
357
- instance = gcp.spanner.InstanceIAMPolicy("instance",
358
- instance="your-instance-name",
359
- policy_data=admin.policy_data)
360
- ```
361
-
362
332
  ## spanner.InstanceIAMBinding
363
333
 
364
334
  ```python
@@ -345,6 +345,27 @@ class BucketIAMBinding(pulumi.CustomResource):
345
345
  })
346
346
  ```
347
347
 
348
+ ## This resource supports User Project Overrides.
349
+
350
+ -
351
+
352
+ # IAM policy for Cloud Storage Bucket
353
+ Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
354
+
355
+ * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
356
+ * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
357
+ * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
358
+
359
+ A data source can be used to retrieve policy data in advent you do not need creation
360
+
361
+ * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
362
+
363
+ > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
364
+
365
+ > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
366
+
367
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
368
+
348
369
  ## storage.BucketIAMPolicy
349
370
 
350
371
  ```python
@@ -604,6 +625,27 @@ class BucketIAMBinding(pulumi.CustomResource):
604
625
  })
605
626
  ```
606
627
 
628
+ ## This resource supports User Project Overrides.
629
+
630
+ -
631
+
632
+ # IAM policy for Cloud Storage Bucket
633
+ Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
634
+
635
+ * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
636
+ * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
637
+ * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
638
+
639
+ A data source can be used to retrieve policy data in advent you do not need creation
640
+
641
+ * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
642
+
643
+ > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
644
+
645
+ > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
646
+
647
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
648
+
607
649
  ## storage.BucketIAMPolicy
608
650
 
609
651
  ```python
@@ -345,6 +345,27 @@ class BucketIAMMember(pulumi.CustomResource):
345
345
  })
346
346
  ```
347
347
 
348
+ ## This resource supports User Project Overrides.
349
+
350
+ -
351
+
352
+ # IAM policy for Cloud Storage Bucket
353
+ Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
354
+
355
+ * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
356
+ * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
357
+ * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
358
+
359
+ A data source can be used to retrieve policy data in advent you do not need creation
360
+
361
+ * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
362
+
363
+ > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
364
+
365
+ > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
366
+
367
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
368
+
348
369
  ## storage.BucketIAMPolicy
349
370
 
350
371
  ```python
@@ -604,6 +625,27 @@ class BucketIAMMember(pulumi.CustomResource):
604
625
  })
605
626
  ```
606
627
 
628
+ ## This resource supports User Project Overrides.
629
+
630
+ -
631
+
632
+ # IAM policy for Cloud Storage Bucket
633
+ Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
634
+
635
+ * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
636
+ * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
637
+ * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
638
+
639
+ A data source can be used to retrieve policy data in advent you do not need creation
640
+
641
+ * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
642
+
643
+ > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
644
+
645
+ > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
646
+
647
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
648
+
607
649
  ## storage.BucketIAMPolicy
608
650
 
609
651
  ```python
@@ -230,6 +230,27 @@ class BucketIAMPolicy(pulumi.CustomResource):
230
230
  })
231
231
  ```
232
232
 
233
+ ## This resource supports User Project Overrides.
234
+
235
+ -
236
+
237
+ # IAM policy for Cloud Storage Bucket
238
+ Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
239
+
240
+ * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
241
+ * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
242
+ * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
243
+
244
+ A data source can be used to retrieve policy data in advent you do not need creation
245
+
246
+ * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
247
+
248
+ > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
249
+
250
+ > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
251
+
252
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
253
+
233
254
  ## storage.BucketIAMPolicy
234
255
 
235
256
  ```python
@@ -475,6 +496,27 @@ class BucketIAMPolicy(pulumi.CustomResource):
475
496
  })
476
497
  ```
477
498
 
499
+ ## This resource supports User Project Overrides.
500
+
501
+ -
502
+
503
+ # IAM policy for Cloud Storage Bucket
504
+ Three different resources help you manage your IAM policy for Cloud Storage Bucket. Each of these resources serves a different use case:
505
+
506
+ * `storage.BucketIAMPolicy`: Authoritative. Sets the IAM policy for the bucket and replaces any existing policy already attached.
507
+ * `storage.BucketIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the bucket are preserved.
508
+ * `storage.BucketIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the bucket are preserved.
509
+
510
+ A data source can be used to retrieve policy data in advent you do not need creation
511
+
512
+ * `storage.BucketIAMPolicy`: Retrieves the IAM policy for the bucket
513
+
514
+ > **Note:** `storage.BucketIAMPolicy` **cannot** be used in conjunction with `storage.BucketIAMBinding` and `storage.BucketIAMMember` or they will fight over what your policy should be.
515
+
516
+ > **Note:** `storage.BucketIAMBinding` resources **can be** used in conjunction with `storage.BucketIAMMember` resources **only if** they do not grant privilege to the same role.
517
+
518
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
519
+
478
520
  ## storage.BucketIAMPolicy
479
521
 
480
522
  ```python
@@ -383,6 +383,28 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
383
383
  })
384
384
  ```
385
385
 
386
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
387
+
388
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
389
+ ---
390
+
391
+ # IAM policy for Cloud Storage ManagedFolder
392
+ Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
393
+
394
+ * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
395
+ * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
396
+ * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
397
+
398
+ A data source can be used to retrieve policy data in advent you do not need creation
399
+
400
+ * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
401
+
402
+ > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
403
+
404
+ > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
405
+
406
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
407
+
386
408
  ## storage.ManagedFolderIamPolicy
387
409
 
388
410
  ```python
@@ -655,6 +677,28 @@ class ManagedFolderIamBinding(pulumi.CustomResource):
655
677
  })
656
678
  ```
657
679
 
680
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
681
+
682
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
683
+ ---
684
+
685
+ # IAM policy for Cloud Storage ManagedFolder
686
+ Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
687
+
688
+ * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
689
+ * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
690
+ * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
691
+
692
+ A data source can be used to retrieve policy data in advent you do not need creation
693
+
694
+ * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
695
+
696
+ > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
697
+
698
+ > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
699
+
700
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
701
+
658
702
  ## storage.ManagedFolderIamPolicy
659
703
 
660
704
  ```python
@@ -383,6 +383,28 @@ class ManagedFolderIamMember(pulumi.CustomResource):
383
383
  })
384
384
  ```
385
385
 
386
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
387
+
388
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
389
+ ---
390
+
391
+ # IAM policy for Cloud Storage ManagedFolder
392
+ Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
393
+
394
+ * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
395
+ * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
396
+ * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
397
+
398
+ A data source can be used to retrieve policy data in advent you do not need creation
399
+
400
+ * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
401
+
402
+ > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
403
+
404
+ > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
405
+
406
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
407
+
386
408
  ## storage.ManagedFolderIamPolicy
387
409
 
388
410
  ```python
@@ -655,6 +677,28 @@ class ManagedFolderIamMember(pulumi.CustomResource):
655
677
  })
656
678
  ```
657
679
 
680
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
681
+
682
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
683
+ ---
684
+
685
+ # IAM policy for Cloud Storage ManagedFolder
686
+ Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
687
+
688
+ * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
689
+ * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
690
+ * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
691
+
692
+ A data source can be used to retrieve policy data in advent you do not need creation
693
+
694
+ * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
695
+
696
+ > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
697
+
698
+ > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
699
+
700
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
701
+
658
702
  ## storage.ManagedFolderIamPolicy
659
703
 
660
704
  ```python
@@ -268,6 +268,28 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
268
268
  })
269
269
  ```
270
270
 
271
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
272
+
273
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
274
+ ---
275
+
276
+ # IAM policy for Cloud Storage ManagedFolder
277
+ Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
278
+
279
+ * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
280
+ * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
281
+ * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
282
+
283
+ A data source can be used to retrieve policy data in advent you do not need creation
284
+
285
+ * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
286
+
287
+ > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
288
+
289
+ > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
290
+
291
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
292
+
271
293
  ## storage.ManagedFolderIamPolicy
272
294
 
273
295
  ```python
@@ -526,6 +548,28 @@ class ManagedFolderIamPolicy(pulumi.CustomResource):
526
548
  })
527
549
  ```
528
550
 
551
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
552
+
553
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
554
+ ---
555
+
556
+ # IAM policy for Cloud Storage ManagedFolder
557
+ Three different resources help you manage your IAM policy for Cloud Storage ManagedFolder. Each of these resources serves a different use case:
558
+
559
+ * `storage.ManagedFolderIamPolicy`: Authoritative. Sets the IAM policy for the managedfolder and replaces any existing policy already attached.
560
+ * `storage.ManagedFolderIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the managedfolder are preserved.
561
+ * `storage.ManagedFolderIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the managedfolder are preserved.
562
+
563
+ A data source can be used to retrieve policy data in advent you do not need creation
564
+
565
+ * `storage.ManagedFolderIamPolicy`: Retrieves the IAM policy for the managedfolder
566
+
567
+ > **Note:** `storage.ManagedFolderIamPolicy` **cannot** be used in conjunction with `storage.ManagedFolderIamBinding` and `storage.ManagedFolderIamMember` or they will fight over what your policy should be.
568
+
569
+ > **Note:** `storage.ManagedFolderIamBinding` resources **can be** used in conjunction with `storage.ManagedFolderIamMember` resources **only if** they do not grant privilege to the same role.
570
+
571
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
572
+
529
573
  ## storage.ManagedFolderIamPolicy
530
574
 
531
575
  ```python